Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 07 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sandboxie-plus:sandboxie:*:*:*:*:plus:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 07 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 07 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sandboxie-plus
Sandboxie-plus sandboxie |
|
| Vendors & Products |
Sandboxie-plus
Sandboxie-plus sandboxie |
Tue, 05 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, several ProcessServer handlers (KillAllHandler, SuspendAllHandler, and RunSandboxedHandler) copy a WCHAR boxname[34] field from request structures into WCHAR[40] stack buffers using wcscpy without verifying null termination. Because the service pipe accepts variable-length packets larger than the request structure, an attacker can fill the boxname field with non-zero data and append additional controlled wide characters after the structure. wcscpy then reads past the fixed field and overflows the destination stack buffer. The service pipe is created with a NULL DACL, allowing any local process to connect, and the unsafe copy occurs before authorization checks. This can lead to a crash of the SbieSvc service or potential code execution as SYSTEM. This issue has been fixed in version 1.17.3. | |
| Title | Sandboxie-Plus ProcessServer boxname stack buffer overflows via unterminated wide string copy | |
| Weaknesses | CWE-121 CWE-170 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T12:56:03.593Z
Reserved: 2026-03-27T18:18:14.896Z
Link: CVE-2026-34462
Updated: 2026-05-06T15:30:18.330Z
Status : Analyzed
Published: 2026-05-05T20:16:37.610
Modified: 2026-05-07T19:47:30.260
Link: CVE-2026-34462
No data.
OpenCVE Enrichment
Updated: 2026-05-05T22:00:11Z