CVE-2025-64721
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-11

Last updated on: 2025-12-15

Assigner: GitHub, Inc.

Description
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-11
Last Modified
2025-12-15
Generated
2026-05-06
AI Q&A
2025-12-12
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
sandboxie sandboxie 1.16.7
sandboxie sandboxie 1.16.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-190 The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Sandboxie versions 1.16.6 and below, where the SYSTEM-level service SbieSvc.exe exposes a function called SbieIniServer::RC4Crypt to sandboxed processes. The function improperly handles a caller-controlled length value without checking for overflow, leading to a heap overflow when large values are used. This allows sandboxed processes to execute arbitrary code with SYSTEM privileges, fully compromising the host system. The issue is fixed in version 1.16.7.


How can this vulnerability impact me? :

An attacker who can run code inside a sandboxed process can exploit this vulnerability to execute arbitrary code with SYSTEM-level privileges on the host machine. This means the attacker can fully compromise the host system, bypassing the sandbox isolation and gaining complete control over the affected computer.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Sandboxie to version 1.16.7 or later, as this version contains the fix for the vulnerability. Until the update is applied, avoid running untrusted sandboxed processes that could exploit the heap overflow to execute arbitrary code as SYSTEM.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart