PT-2026-37226 · Unknown · Sandboxie Plus
Sammy12342
·
Published
2026-05-05
·
Updated
2026-05-05
·
CVE-2026-34459
CVSS v4.0
8.8
High
| Vector | AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
Name of the Vulnerable Software and Affected Versions
Sandboxie-Plus versions prior to 1.17.3
Description
The SbieSvc proxy service's
GetRawInputDeviceInfoSlave() handler contains an information leak and a stack buffer overflow. An information leak occurs when a sandboxed process sends an IPC request with cbSize set to 0, causing up to 32KB of uninitialized stack memory to be returned. This leaks return addresses and stack cookies, bypassing Address Space Layout Randomization (ASLR) and /GS protections. Additionally, the handler performs a memcpy operation using an attacker-controlled length without verifying if it fits within the 32KB stack buffer. By chaining these issues, a sandboxed process can execute a Return-Oriented Programming (ROP) chain—a technique that strings together small pieces of existing executable code—to achieve SYSTEM privilege escalation, even from a Security Hardened Sandbox. Hardware-enforced shadow stacks (Intel CET) prevent the ROP chain execution but do not stop the information leak.Recommendations
Update to version 1.17.3.
Fix
Stack Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Sandboxie Plus