Vulnerabilites related to kaspersky_lab - kaspersky_anti-virus_personal
cve-2005-3664
Vulnerability from cvelistv5
Published
2005-11-18 11:00
Modified
2024-08-07 23:17
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/17130 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/19913 | vdb-entry, x_refsource_OSVDB | |
http://www.idefense.com/application/poi/display?id=318&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE | |
http://www.osvdb.org/19912 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22564 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/15054 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/17144 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.391Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17130", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17130" }, { "name": "19913", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/19913" }, { "name": "20051010 Kaspersky Anti-Virus Engine CHM File Parser Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=318\u0026type=vulnerabilities" }, { "name": "19912", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/19912" }, { "name": "kaspersky-fsecure-chm-bo(22564)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22564" }, { "name": "15054", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15054" }, { "name": "17144", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17144" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "17130", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17130" }, { "name": "19913", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/19913" }, { "name": "20051010 Kaspersky Anti-Virus Engine CHM File Parser Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=318\u0026type=vulnerabilities" }, { "name": "19912", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/19912" }, { "name": "kaspersky-fsecure-chm-bo(22564)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22564" }, { "name": "15054", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15054" }, { "name": "17144", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17144" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3664", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "17130", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17130" }, { "name": "19913", "refsource": "OSVDB", "url": "http://www.osvdb.org/19913" }, { "name": "20051010 Kaspersky Anti-Virus Engine CHM File Parser Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=318\u0026type=vulnerabilities" }, { "name": "19912", "refsource": "OSVDB", "url": "http://www.osvdb.org/19912" }, { "name": "kaspersky-fsecure-chm-bo(22564)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22564" }, { "name": "15054", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15054" }, { "name": "17144", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17144" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3664", "datePublished": "2005-11-18T11:00:00", "dateReserved": "2005-11-18T00:00:00", "dateUpdated": "2024-08-07T23:17:23.391Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-3142
Vulnerability from cvelistv5
Published
2005-10-05 04:00
Modified
2024-08-07 23:01
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2005/1934 | vdb-entry, x_refsource_VUPEN | |
http://marc.info/?l=bugtraq&m=112837961522571&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://securityreason.com/securityalert/44 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/14998 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/17024/ | third-party-advisory, x_refsource_SECUNIA | |
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0018.html | mailing-list, x_refsource_FULLDISC | |
http://www.osvdb.org/19850 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1014998 | vdb-entry, x_refsource_SECTRACK | |
http://www.rem0te.com/public/images/kaspersky.pdf | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22497 | vdb-entry, x_refsource_XF | |
http://www.kaspersky.com/news?id=171512144 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:57.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2005-1934", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1934" }, { "name": "20051003 Kaspersky Antivirus Remote Heap Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112837961522571\u0026w=2" }, { "name": "44", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/44" }, { "name": "14998", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14998" }, { "name": "17024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17024/" }, { "name": "20051003 Kaspersky Antivirus Library Remote Heap Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0018.html" }, { "name": "19850", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/19850" }, { "name": "1014998", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014998" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rem0te.com/public/images/kaspersky.pdf" }, { "name": "kaspersky-cab-heap-overflow(22497)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22497" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kaspersky.com/news?id=171512144" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2005-1934", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1934" }, { "name": "20051003 Kaspersky Antivirus Remote Heap Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112837961522571\u0026w=2" }, { "name": "44", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/44" }, { "name": "14998", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14998" }, { "name": "17024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17024/" }, { "name": "20051003 Kaspersky Antivirus Library Remote Heap Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0018.html" }, { "name": "19850", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/19850" }, { "name": "1014998", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014998" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rem0te.com/public/images/kaspersky.pdf" }, { "name": "kaspersky-cab-heap-overflow(22497)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22497" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kaspersky.com/news?id=171512144" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2005-1934", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1934" }, { "name": "20051003 Kaspersky Antivirus Remote Heap Overflow", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112837961522571\u0026w=2" }, { "name": "44", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/44" }, { "name": "14998", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14998" }, { "name": "17024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17024/" }, { "name": "20051003 Kaspersky Antivirus Library Remote Heap Overflow", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0018.html" }, { "name": "19850", "refsource": "OSVDB", "url": "http://www.osvdb.org/19850" }, { "name": "1014998", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014998" }, { "name": "http://www.rem0te.com/public/images/kaspersky.pdf", "refsource": "MISC", "url": "http://www.rem0te.com/public/images/kaspersky.pdf" }, { "name": "kaspersky-cab-heap-overflow(22497)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22497" }, { "name": "http://www.kaspersky.com/news?id=171512144", "refsource": "CONFIRM", "url": "http://www.kaspersky.com/news?id=171512144" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3142", "datePublished": "2005-10-05T04:00:00", "dateReserved": "2005-10-05T00:00:00", "dateUpdated": "2024-08-07T23:01:57.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-1905
Vulnerability from cvelistv5
Published
2005-06-08 04:00
Modified
2024-08-07 22:06
Severity ?
EPSS score ?
Summary
The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/13878 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=111817777430401&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:06:57.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "13878", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13878" }, { "name": "20050607 Kaspersky AntiVirus \"klif.sys\" Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111817777430401\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "13878", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13878" }, { "name": "20050607 Kaspersky AntiVirus \"klif.sys\" Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111817777430401\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1905", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "13878", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13878" }, { "name": "20050607 Kaspersky AntiVirus \"klif.sys\" Privilege Escalation Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111817777430401\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1905", "datePublished": "2005-06-08T04:00:00", "dateReserved": "2005-06-08T00:00:00", "dateUpdated": "2024-08-07T22:06:57.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4926
Vulnerability from cvelistv5
Published
2006-10-20 22:00
Modified
2024-08-07 19:32
Severity ?
EPSS score ?
Summary
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/449289/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29677 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/29891 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/archive/1/449301/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.kaspersky.com/technews?id=203038678 | x_refsource_CONFIRM | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425 | third-party-advisory, x_refsource_IDEFENSE | |
http://secunia.com/advisories/22478 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/20635 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1017093 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/4117 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:32:22.423Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20061020 [Reversemode Advisory] Kaspersky Anti-Virus Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449289/100/0/threaded" }, { "name": "kaspersky-klinklick-privilege-escalation(29677)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29677" }, { "name": "29891", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/29891" }, { "name": "20061020 Re: iDefense Security Advisory 10.19.06: Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449301/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kaspersky.com/technews?id=203038678" }, { "name": "20061020 Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425" }, { "name": "22478", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22478" }, { "name": "20635", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20635" }, { "name": "1017093", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017093" }, { "name": "ADV-2006-4117", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4117" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20061020 [Reversemode Advisory] Kaspersky Anti-Virus Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/449289/100/0/threaded" }, { "name": "kaspersky-klinklick-privilege-escalation(29677)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29677" }, { "name": "29891", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/29891" }, { "name": "20061020 Re: iDefense Security Advisory 10.19.06: Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/449301/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kaspersky.com/technews?id=203038678" }, { "name": "20061020 Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425" }, { "name": "22478", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22478" }, { "name": "20635", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20635" }, { "name": "1017093", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017093" }, { "name": "ADV-2006-4117", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4117" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4926", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20061020 [Reversemode Advisory] Kaspersky Anti-Virus Privilege Escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/449289/100/0/threaded" }, { "name": "kaspersky-klinklick-privilege-escalation(29677)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29677" }, { "name": "29891", "refsource": "OSVDB", "url": "http://www.osvdb.org/29891" }, { "name": "20061020 Re: iDefense Security Advisory 10.19.06: Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/449301/100/0/threaded" }, { "name": "http://www.kaspersky.com/technews?id=203038678", "refsource": "CONFIRM", "url": "http://www.kaspersky.com/technews?id=203038678" }, { "name": "20061020 Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425" }, { "name": "22478", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22478" }, { "name": "20635", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20635" }, { "name": "1017093", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017093" }, { "name": "ADV-2006-4117", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4117" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4926", "datePublished": "2006-10-20T22:00:00", "dateReserved": "2006-09-22T00:00:00", "dateUpdated": "2024-08-07T19:32:22.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4452
Vulnerability from cvelistv5
Published
2009-12-29 20:15
Modified
2024-08-07 07:01
Severity ?
EPSS score ?
Summary
Kaspersky Anti-Virus 5.0 (5.0.712); Antivirus Personal 5.0.x; Anti-Virus 6.0 (6.0.3.837), 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); and Internet Security 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); use weak permissions (Everyone:Full Control) for the BASES directory, which allows local users to gain SYSTEM privileges by replacing an executable or DLL with a Trojan horse.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2009/3573 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1023366 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/37730 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/508508/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.exploit-db.com/exploits/10484 | exploit, x_refsource_EXPLOIT-DB | |
http://secunia.com/advisories/37398 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1023367 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:01:20.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-3573", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3573" }, { "name": "1023366", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023366" }, { "name": "37730", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37730" }, { "name": "20091216 Kaspersky Lab Multiple Products Local Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/508508/100/0/threaded" }, { "name": "10484", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/10484" }, { "name": "37398", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37398" }, { "name": "1023367", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023367" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Kaspersky Anti-Virus 5.0 (5.0.712); Antivirus Personal 5.0.x; Anti-Virus 6.0 (6.0.3.837), 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); and Internet Security 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); use weak permissions (Everyone:Full Control) for the BASES directory, which allows local users to gain SYSTEM privileges by replacing an executable or DLL with a Trojan horse." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-3573", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3573" }, { "name": "1023366", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023366" }, { "name": "37730", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37730" }, { "name": "20091216 Kaspersky Lab Multiple Products Local Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/508508/100/0/threaded" }, { "name": "10484", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/10484" }, { "name": "37398", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37398" }, { "name": "1023367", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023367" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4452", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Kaspersky Anti-Virus 5.0 (5.0.712); Antivirus Personal 5.0.x; Anti-Virus 6.0 (6.0.3.837), 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); and Internet Security 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); use weak permissions (Everyone:Full Control) for the BASES directory, which allows local users to gain SYSTEM privileges by replacing an executable or DLL with a Trojan horse." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-3573", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3573" }, { "name": "1023366", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023366" }, { "name": "37730", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37730" }, { "name": "20091216 Kaspersky Lab Multiple Products Local Privilege Escalation Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/508508/100/0/threaded" }, { "name": "10484", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/10484" }, { "name": "37398", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37398" }, { "name": "1023367", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023367" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4452", "datePublished": "2009-12-29T20:15:00", "dateReserved": "2009-12-29T00:00:00", "dateUpdated": "2024-08-07T07:01:20.350Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2005-06-09 04:00
Modified
2024-11-20 23:58
Severity ?
Summary
The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kaspersky_lab | kaspersky_anti-virus | 5.0.227 | |
kaspersky_lab | kaspersky_anti-virus | 5.0.228 | |
kaspersky_lab | kaspersky_anti-virus | 5.0.335 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0.227 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0.228 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0.325 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0.227:*:windows_file_servers:*:*:*:*:*", "matchCriteriaId": "75093819-5663-4478-A291-60FF71D0258B", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0.228:*:windows_file_servers:*:*:*:*:*", "matchCriteriaId": "AD53B19B-64C8-4D05-81E0-770EEAE55D32", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0.335:*:windows_file_servers:*:*:*:*:*", "matchCriteriaId": "7D53F90C-00DB-4A12-9AD6-DB6917D0E034", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0.227:*:*:*:*:*:*:*", "matchCriteriaId": "E101D150-B268-43AA-9876-469DF471DFC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0.228:*:*:*:*:*:*:*", "matchCriteriaId": "22A10BAE-B162-4276-8B08-8E449D9B282D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0.325:*:*:*:*:*:*:*", "matchCriteriaId": "7F3AAC32-1911-4955-B1B1-CF7B26BEA3F3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs." } ], "id": "CVE-2005-1905", "lastModified": "2024-11-20T23:58:23.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-09T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=111817777430401\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/13878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111817777430401\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/13878" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-12-29 20:41
Modified
2024-11-21 01:09
Severity ?
Summary
Kaspersky Anti-Virus 5.0 (5.0.712); Antivirus Personal 5.0.x; Anti-Virus 6.0 (6.0.3.837), 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); and Internet Security 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); use weak permissions (Everyone:Full Control) for the BASES directory, which allows local users to gain SYSTEM privileges by replacing an executable or DLL with a Trojan horse.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kaspersky_lab | kaspersky_anti-virus | 5.0.712 | |
kaspersky_lab | kaspersky_anti-virus | 6.0.3.837 | |
kaspersky_lab | kaspersky_anti-virus | 6.0.3.837 | |
kaspersky_lab | kaspersky_anti-virus | 7.0.1.325 | |
kaspersky_lab | kaspersky_anti-virus_2009 | 8.0.0.454 | |
kaspersky_lab | kaspersky_anti-virus_2010 | 9.0.0.463 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0.227 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0.228 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0.325 | |
kaspersky_lab | kaspersky_internet_security | 7.0.1.325 | |
kaspersky_lab | kaspersky_internet_security_2009 | 8.0.0.506 | |
kaspersky_lab | kaspersky_internet_security_2010 | 9.0.0.463 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0.712:*:windows_workstations:*:*:*:*:*", "matchCriteriaId": "1D6BB158-236E-4B5B-B32F-265484B88668", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:6.0.3.837:*:windows_file_servers:*:*:*:*:*", "matchCriteriaId": "FC269851-529F-4806-B873-1024F05EE1BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:6.0.3.837:*:windows_workstation:*:*:*:*:*", "matchCriteriaId": "897366CD-7C06-4124-A66A-9D499FFE0E09", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:7.0.1.325:*:*:*:*:*:*:*", "matchCriteriaId": "A80BDC43-39DB-49C9-9F73-A97B42EAE74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_2009:8.0.0.454:*:*:*:*:*:*:*", "matchCriteriaId": "6CE76B5D-5587-4ECE-8530-440BF4F453B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_2010:9.0.0.463:*:*:*:*:*:*:*", "matchCriteriaId": "46A667E4-8E75-4CFF-B30D-1D3D11200A44", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2BA07931-220A-4FCC-A83D-0C91563385DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0.227:*:*:*:*:*:*:*", "matchCriteriaId": "E101D150-B268-43AA-9876-469DF471DFC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0.228:*:*:*:*:*:*:*", "matchCriteriaId": "22A10BAE-B162-4276-8B08-8E449D9B282D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0.325:*:*:*:*:*:*:*", "matchCriteriaId": "7F3AAC32-1911-4955-B1B1-CF7B26BEA3F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_internet_security:7.0.1.325:*:*:*:*:*:*:*", "matchCriteriaId": "65942CAB-ED76-4FC6-81AF-E3AE56A58185", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_internet_security_2009:8.0.0.506:*:*:*:*:*:*:*", "matchCriteriaId": "03D166CB-4E20-4A58-BE03-EB342B477027", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_internet_security_2010:9.0.0.463:*:*:*:*:*:*:*", "matchCriteriaId": "E125CB4B-DA1B-4D37-B1C7-9F7025716BA7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kaspersky Anti-Virus 5.0 (5.0.712); Antivirus Personal 5.0.x; Anti-Virus 6.0 (6.0.3.837), 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); and Internet Security 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); use weak permissions (Everyone:Full Control) for the BASES directory, which allows local users to gain SYSTEM privileges by replacing an executable or DLL with a Trojan horse." }, { "lang": "es", "value": "Kaspersky Anti-Virus v5.0 (v5.0.712); Antivirus Personal v5.0.x; Anti-Virus v6.0 (v6.0.3.837), v7 (v7.0.1.325), 2009 (v8.0.0.x), and 2010 (v9.0.0.463); y Internet Security v7 (v7.0.1.325), 2009 (v8.0.0.x), and 2010 (v9.0.0.463); usan permisos d\u00e9biles (Todo el mundo: Control Total) en el directorio BASES, lo que permite a usuarios locales obtener privilegios de SYSTEM sustituyendo un ejecutable o DLL con un caballo de troya." } ], "id": "CVE-2009-4452", "lastModified": "2024-11-21T01:09:40.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-12-29T20:41:20.577", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37398" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37730" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/10484" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/508508/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023366" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023367" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37398" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/10484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/508508/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023367" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3573" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-20 22:07
Modified
2024-11-21 00:17
Severity ?
Summary
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kaspersky_lab | kaspersky_anti-virus | 5.0 | |
kaspersky_lab | kaspersky_anti-virus | 6.0 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0 | |
kaspersky_lab | kaspersky_anti-virus_personal_pro | 5.0 | |
kaspersky_lab | kaspersky_internet_security | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:windows_workstations:*:*:*:*:*", "matchCriteriaId": "5897A334-2627-480C-9CF3-85AF3B7650BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:6.0:*:workstations:*:*:*:*:*", "matchCriteriaId": "53049BB1-486B-4C01-A3F5-F900FAD33024", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2BA07931-220A-4FCC-A83D-0C91563385DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal_pro:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A64212DE-796D-4D5D-901A-0B5FA40D9C39", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_internet_security:6.0:maintenance_pack_2:*:*:*:*:*:*", "matchCriteriaId": "95A787E0-7060-4544-993A-9CB319B6925E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL." }, { "lang": "es", "value": "El NDIS-TDI Hooking Engine, seg\u00fan lo utilizado en (1) KLICK (KLICK.SYS) y (2) KLIN (KLIN.SYS) en los controladores de dispositivos 2.0.0.281 en Kaspersky Labs Anti-Virus 6.0.0.303 y otros antivirus o productos de seguridad de Internet, permite a un usuario local ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un estructura Irp artesanal con una direcci\u00f3n inv\u00e1lida en 0x80052110 IOCTL." } ], "id": "CVE-2006-4926", "lastModified": "2024-11-21T00:17:10.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-10-20T22:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22478" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://securitytracker.com/id?1017093" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.kaspersky.com/technews?id=203038678" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/29891" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449289/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/449301/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/20635" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4117" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://securitytracker.com/id?1017093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.kaspersky.com/technews?id=203038678" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/29891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449289/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449301/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/20635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29677" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-10-05 21:02
Modified
2024-11-21 00:01
Severity ?
Summary
Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kaspersky_lab | kaspersky_anti-virus | 5.0 | |
kaspersky_lab | kaspersky_anti-virus | 5.0 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0 | |
kaspersky_lab | kaspersky_anti-virus_personal_pro | 5.0 | |
kaspersky_lab | kaspersky_personal_security_suite | 1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:windows_file_servers:*:*:*:*:*", "matchCriteriaId": "DFD8A5C2-DC03-4605-B502-3A895B7D377C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:windows_workstations:*:*:*:*:*", "matchCriteriaId": "5897A334-2627-480C-9CF3-85AF3B7650BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2BA07931-220A-4FCC-A83D-0C91563385DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal_pro:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A64212DE-796D-4D5D-901A-0B5FA40D9C39", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_personal_security_suite:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "05EAE20B-6A64-4AC0-91C3-73AEC48B4BF1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header." } ], "id": "CVE-2005-3142", "lastModified": "2024-11-21T00:01:12.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-10-05T21:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0018.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112837961522571\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17024/" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/44" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014998" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.kaspersky.com/news?id=171512144" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/19850" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.rem0te.com/public/images/kaspersky.pdf" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/14998" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/1934" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112837961522571\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17024/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.kaspersky.com/news?id=171512144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/19850" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.rem0te.com/public/images/kaspersky.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/14998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/1934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22497" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-11-18 06:04
Modified
2024-11-21 00:02
Severity ?
Summary
Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | f-secure_anti-virus | 4.50 | |
kaspersky_lab | kaspersky_anti-virus | 5.0.5 | |
kaspersky_lab | kaspersky_anti-virus | 5.0.5 | |
kaspersky_lab | kaspersky_anti-virus_personal | 5.0.227 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50:*:linux:*:*:*:*:*", "matchCriteriaId": "55C7A7CD-1BAB-475A-BEC1-3AFD15366103", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0.5:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "5A3B9DBA-58A9-4E15-8B22-67795D047278", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0.5:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "A4C38ABE-5C16-4DD0-88A4-21597315567F", "vulnerable": true }, { "criteria": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0.227:*:*:*:*:*:*:*", "matchCriteriaId": "E101D150-B268-43AA-9876-469DF471DFC4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file." } ], "id": "CVE-2005-3664", "lastModified": "2024-11-21T00:02:23.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-18T06:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17130" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17144" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=318\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/19912" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/19913" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15054" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=318\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/19912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/19913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22564" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }