PT-2026-37228 · Unknown · Sandboxie Plus

Yanchon918S

·

Published

2026-05-05

·

Updated

2026-05-05

·

CVE-2026-34462

CVSS v4.0

7.3

High

VectorAV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions Sandboxie-Plus versions prior to 1.17.3
Description Several ProcessServer handlers, specifically KillAllHandler(), SuspendAllHandler(), and RunSandboxedHandler(), copy a boxname field from request structures into stack buffers using wcscpy without verifying null termination. Since the service pipe accepts variable-length packets larger than the request structure, a local attacker can fill the boxname field with non-zero data and append controlled wide characters to overflow the destination stack buffer. The service pipe is created with a NULL DACL (Discretionary Access Control List), which is a security descriptor that allows any local process to connect, and the unsafe copy occurs before authorization checks. This can result in a crash of the SbieSvc service or potential code execution with SYSTEM privileges.
Recommendations Update to version 1.17.3.

Fix

Stack Overflow

Weakness Enumeration

Related Identifiers

CVE-2026-34462

Affected Products

Sandboxie Plus