CVE-2025-64721

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.
CVSS

No CVSS.

Configurations

No configuration.

History

15 Dec 2025, 16:15

Type Values Removed Values Added
References () https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp - () https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp -

11 Dec 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-11 22:15

Updated : 2025-12-15 16:15


NVD link : CVE-2025-64721

Mitre link : CVE-2025-64721

CVE.ORG link : CVE-2025-64721


JSON object : View

Products Affected

No product.

CWE
CWE-190

Integer Overflow or Wraparound