8 results (0.013 seconds)

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 1

Aavmker4.sys in avast! 4.8 through 4.8.1368.0 and 5.0 before 5.0.418.0 running on Windows 2000 and XP does not properly validate input to IOCTL 0xb2d60030, which allows local users to cause a denial of service (system crash) or execute arbitrary code to gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption. Aavmker4.sys en avast! desde v4.8 hasta v4.8.1368.0 y v5.0 anteriores a v5.0.418.0 corriendo sobre Windows 2000 o XP, no valida adecuadamente una entrada a IOCTL 0xb2d60030, lo que permite a usuarios locales producir una denegación de servicio (caída del sistema) o ejecutar código arbitrario para ganar privilegios a través de peticiones IOCTL utilizando direcciones de kernel manipuladas que inician una corrupción de memoria. • https://www.exploit-db.com/exploits/12406 http://forum.avast.com/index.php?topic=55484.0 http://osvdb.org/62510 http://secunia.com/advisories/38677 http://secunia.com/advisories/38689 http://www.securityfocus.com/archive/1/509710/100/0/threaded http://www.securityfocus.com/bid/38363 http://www.securitytracker.com/id?1023644 http://www.trapkit.de/advisories/TKADV2010-003.txt http://www.vupen.com/english/advisories/2010/0449 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024. Desbordamiento de búfer basado en memoria dinámica (heap) en aswRdr.sys (también conocido como el controlador TDI RDR) en avast! Home y Professional v4.8.1356.0, permite a usuarios locales provocar una denegación de servicio (corrupción de memoria) o posiblemente elevar sus privilegios a través de argumentos manipulados a IOCTL 0x80002024. • https://www.exploit-db.com/exploits/33360 https://github.com/fengjixuchui/CVE-2009-4049 http://secunia.com/advisories/37368 http://www.efblog.net/2009/11/avast-aswrdrsys-kernel-pool-corruption.html http://www.securityfocus.com/archive/1/507891/100/0/threaded http://www.securityfocus.com/bid/37031 http://www.vupen.com/english/advisories/2009/3266 https://www.evilfingers.com/advisory/Advisory/Avast_aswRdr_sys_Kernel_Pool_Corruption_and_Local_Privilege_Escalation.php • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 29EXPL: 0

Unspecified vulnerability in ashWsFtr.dll in avast! Home and Professional for Windows before 4.8.1356 has unknown impact and local attack vectors. Vulnerabilidad inesperada en ashWsFtr.dll en avast! Home y Professional para Windows anterior v4.8.1356 tiene un impacto y vectores de ataque no especificados. • http://osvdb.org/58403 http://secunia.com/advisories/36858 http://www.avast.com/eng/avast-4-home_pro-revision-history.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6509 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

Stack-based buffer overflow in aswMon2.sys in avast! Home and Professional for Windows 4.8.1351, and possibly other versions before 4.8.1356, allows local users to cause a denial of service (system crash) and possibly gain privileges via a crafted IOCTL request to IOCTL 0xb2c80018. Desbordamiento de búfer basado en pila en aswMon2.sys en avast! Home y Professional para Windows v4.8.1351, y probablemente otras versiones anteriores v4.8.1356, permite a usuarios locales causar una denegación de servicios (caída sistema) y probablemente obtener privilegios a través de peticiones IOCTL manipuladas en IOCTL 0xb2c80018. • https://www.exploit-db.com/exploits/10106 http://osvdb.org/58402 http://secunia.com/advisories/36858 http://www.avast.com/eng/avast-4-home_pro-revision-history.html http://www.securityfocus.com/archive/1/506681/100/0/threaded http://www.securityfocus.com/bid/36507 http://www.securitytracker.com/id?1022940 http://www.vupen.com/english/advisories/2009/2761 https://exchange.xforce.ibmcloud.com/vulnerabilities/53456 https://oval.cisecurity.org/repository/search/definition/oval%3Aor • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.9EPSS: 0%CPEs: 29EXPL: 2

aavmKer4.sys in avast! Home and Professional for Windows before 4.8.1356 does not properly validate input to IOCTLs (1) 0xb2d6000c and (2) 0xb2d60034, which allows local users to gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption, a different vulnerability than CVE-2008-1625. aavmKer4.sys en avast! Home y Professional para Windows anterior v4.8.1356 no proporciona entradas validad en IOCTLs (1) 0xb2d6000c y (2) 0xb2d60034, que permite a usuarios locales obtener privilegios a través de peticiones IOCTL usando direcciones de kernel manipuladas que lanzan una caída de memoria, una vulnerabilidad diferente que CVE-2008-1625. • https://www.exploit-db.com/exploits/12406 http://secunia.com/advisories/36858 http://www.avast.com/eng/avast-4-home_pro-revision-history.html http://www.ntinternals.org/ntiadv0904/ntiadv0904.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6024 • CWE-20: Improper Input Validation •