Stack Buffer Overflow in Sandboxie-Plus Software by Sandboxie-Plus
CVE-2026-34461

7.3HIGH

Key Information:

Status
Vendor
CVE Published:
5 May 2026

What is CVE-2026-34461?

Sandboxie-Plus, an open-source sandbox-based isolation software for Windows, is vulnerable to a stack buffer overflow in versions 1.17.2 and earlier. The vulnerability arises from the SbieIniServer RunSbieCtrl handler, where the MSGID_SBIE_INI_RUN_SBIE_CTRL message is processed without adequate sandbox and impersonation checks. This oversight allows the handler to copy a potentially oversized payload into a fixed-size stack buffer, leading to a stack overflow. The service pipe's configuration, which employs a NULL DACL, permits any local interactive process to connect and exploit this buffer overflow, possibly causing the SbieSvc service to crash or enabling code execution with SYSTEM privileges. This critical issue was promptly addressed in version 1.17.3 of the software.

Affected Version(s)

Sandboxie < 1.17.3

References

CVSS V4

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.