CVE-2010-5151
https://notcve.org/view.php?id=CVE-2010-5151
Race condition in avast! Internet Security 5.0.462 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute ** EN DISPUTA ** Condición de Carrera en avast! Internet Security v5.0.462 para Windows XP permite a usuarios locales eludir los manejadores de hooks a nivel de kernel, y ejecutar código peligroso que de otra manera sería bloqueada por el manejador y no por una detección basada en firma de malware. Esto se consigue a través de ciertos cambios en la memoria de espacio de usuario durante la ejecución del manejador de hooks. • http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://www.f-secure.com/weblog/archives/00001949.html http://www.osvdb.org/67660 http://www.securit • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2010-3126 – Avast! 5.0.594 - 'mfc90loc.dll' License Files DLL Hijacking
https://notcve.org/view.php?id=CVE-2010-3126
Untrusted search path vulnerability in avast! Free Antivirus version 5.0.594 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse mfc90loc.dll that is located in the same folder as an avast license (.avastlic) file. Vulnerabilidad de búsqueda en ruta no confiable en avast! Free Antivirus v5.0.594 y anteriores, permite a usuarios locales y posiblemente atacantes remotos, la ejecución de código de su elección y llevar a cabo ataques de secuestro de DLL a través de un troyano wab32.dll que está localizada en la misma carpeta como un archivo de licencia Avast (.avastlic). • https://www.exploit-db.com/exploits/14743 http://secunia.com/advisories/41109 http://www.exploit-db.com/exploits/14743 http://www.vupen.com/english/advisories/2010/2175 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7193 •
CVE-2010-0705 – Avast! 4.7 - 'aavmker4.sys' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2010-0705
Aavmker4.sys in avast! 4.8 through 4.8.1368.0 and 5.0 before 5.0.418.0 running on Windows 2000 and XP does not properly validate input to IOCTL 0xb2d60030, which allows local users to cause a denial of service (system crash) or execute arbitrary code to gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption. Aavmker4.sys en avast! desde v4.8 hasta v4.8.1368.0 y v5.0 anteriores a v5.0.418.0 corriendo sobre Windows 2000 o XP, no valida adecuadamente una entrada a IOCTL 0xb2d60030, lo que permite a usuarios locales producir una denegación de servicio (caída del sistema) o ejecutar código arbitrario para ganar privilegios a través de peticiones IOCTL utilizando direcciones de kernel manipuladas que inician una corrupción de memoria. • https://www.exploit-db.com/exploits/12406 http://forum.avast.com/index.php?topic=55484.0 http://osvdb.org/62510 http://secunia.com/advisories/38677 http://secunia.com/advisories/38689 http://www.securityfocus.com/archive/1/509710/100/0/threaded http://www.securityfocus.com/bid/38363 http://www.securitytracker.com/id?1023644 http://www.trapkit.de/advisories/TKADV2010-003.txt http://www.vupen.com/english/advisories/2010/0449 • CWE-20: Improper Input Validation •
CVE-2009-4049 – Avast! AntiVirus 4.8.1356 - 'aswRdr.sys' Driver Privilege Escalation
https://notcve.org/view.php?id=CVE-2009-4049
Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024. Desbordamiento de búfer basado en memoria dinámica (heap) en aswRdr.sys (también conocido como el controlador TDI RDR) en avast! Home y Professional v4.8.1356.0, permite a usuarios locales provocar una denegación de servicio (corrupción de memoria) o posiblemente elevar sus privilegios a través de argumentos manipulados a IOCTL 0x80002024. • https://www.exploit-db.com/exploits/33360 https://github.com/fengjixuchui/CVE-2009-4049 http://secunia.com/advisories/37368 http://www.efblog.net/2009/11/avast-aswrdrsys-kernel-pool-corruption.html http://www.securityfocus.com/archive/1/507891/100/0/threaded http://www.securityfocus.com/bid/37031 http://www.vupen.com/english/advisories/2009/3266 https://www.evilfingers.com/advisory/Advisory/Avast_aswRdr_sys_Kernel_Pool_Corruption_and_Local_Privilege_Escalation.php • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2009-3524
https://notcve.org/view.php?id=CVE-2009-3524
Unspecified vulnerability in ashWsFtr.dll in avast! Home and Professional for Windows before 4.8.1356 has unknown impact and local attack vectors. Vulnerabilidad inesperada en ashWsFtr.dll en avast! Home y Professional para Windows anterior v4.8.1356 tiene un impacto y vectores de ataque no especificados. • http://osvdb.org/58403 http://secunia.com/advisories/36858 http://www.avast.com/eng/avast-4-home_pro-revision-history.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6509 •