1 results (0.004 seconds)

CVSS: 9.3EPSS: 33%CPEs: 2EXPL: 0

Heap-based buffer overflow in the SIS unpacker in avast! Anti-Virus Managed Client before 4.7.700 allows user-assisted remote attackers to execute arbitrary code via a crafted SIS archive, resulting from an "integer cast around." Un desbordamiento de búfer en la región heap de la memoria en el desempaquetador SIS en Anti-Virus Managed Client de avast! anterior a versión 4.7.700, permite a los atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de un archivo SIS creado, como resultado de un "integer cast around." • http://marc.info/?l=full-disclosure&m=118007660813710&w=2 http://osvdb.org/36522 http://www.avast.com/eng/adnm-management-client-revision-history.html http://www.kb.cert.org/vuls/id/125868 http://www.nruns.com/advisories/%5Bn.runs-SA-2007.009%5D%20-%20Avast%21%20Antivirus%20SIS%20parsing%20Arbitrary%20Code%20Execution%20Advisory.txt http://www.securityfocus.com/archive/1/469585/100/0/threaded http://www.securityfocus.com/bid/24155 http://www.vupen.com/english/advisories/2007& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •