CVE-2007-1281
https://notcve.org/view.php?id=CVE-2007-1281
Kaspersky AntiVirus Engine 6.0.1.411 for Windows and 5.5-10 for Linux allows remote attackers to cause a denial of service (CPU consumption) via a crafted UPX compressed file with a negative offset, which triggers an infinite loop during decompression. Kaspersky AntiVirus Engine 6.0.1.411 para Windows y 5.5-10 para Linux permite a atacantes remotos provocar una denegación de servicio (agotamiento de CPU) mediante un archivo comprimido con UPX manipulado con un desplazamiento (offset) negativo, lo cual dispara un bucle infinito durante la extracción. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=485 http://secunia.com/advisories/24391 http://www.securityfocus.com/bid/22795 http://www.securitytracker.com/id?1017718 http://www.vupen.com/english/advisories/2007/0810 https://exchange.xforce.ibmcloud.com/vulnerabilities/32797 •
CVE-2007-0125
https://notcve.org/view.php?id=CVE-2007-0125
Kaspersky Labs Antivirus Engine 6.0 for Windows and 5.5-10 for Linux before 20070102 enter an infinite loop upon encountering an invalid NumberOfRvaAndSizes value in the Optional Windows Header of a portable executable (PE) file, which allows remote attackers to cause a denial of service (CPU consumption) by scanning a crafted PE file. Kaspersky Labs Antivirus Engine 6.0 para Windows y 5.5-10 para Linux anterior al 02/01/2007 entran en un bucle infinito tras encontrar un valor NumberOfRvaAndSizes inválido en la Cabecera Opcional de Windows (Optional Windows Header) de un ejecutable portátil (Portable Executable o PE), lo cual permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) con el escaneo de un archivo PE manipulado. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=459 http://osvdb.org/32588 http://secunia.com/advisories/23575 http://securitytracker.com/id?1017476 http://www.securityfocus.com/bid/21901 http://www.vupen.com/english/advisories/2007/0067 https://exchange.xforce.ibmcloud.com/vulnerabilities/31315 •
CVE-2006-6408
https://notcve.org/view.php?id=CVE-2006-6408
Kaspersky Anti-Virus for Linux Mail Servers 5.5.10 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file. Kaspersky Anti-Virus para Linux Mail Servers 5.5.10 permite a atacantes remotos evitar una detección de virus, insertando caracteres inválidos en un contenido codificado base 64 en un fichero MIME multipart/mixed, como se demuestra con el fichero de testeo EICAR. • http://www.quantenblog.net/security/virus-scanner-bypass http://www.securityfocus.com/archive/1/453654/100/0/threaded http://www.securityfocus.com/bid/21461 •
CVE-2006-4926 – Kaspersky Internet Security 6.0.0.303 - IOCTL KLICK Local Overflow / Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2006-4926
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL. El NDIS-TDI Hooking Engine, según lo utilizado en (1) KLICK (KLICK.SYS) y (2) KLIN (KLIN.SYS) en los controladores de dispositivos 2.0.0.281 en Kaspersky Labs Anti-Virus 6.0.0.303 y otros antivirus o productos de seguridad de Internet, permite a un usuario local ejecutar código de su elección a través de un estructura Irp artesanal con una dirección inválida en 0x80052110 IOCTL. • https://www.exploit-db.com/exploits/2676 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425 http://secunia.com/advisories/22478 http://securitytracker.com/id?1017093 http://www.kaspersky.com/technews?id=203038678 http://www.osvdb.org/29891 http://www.securityfocus.com/archive/1/449289/100/0/threaded http://www.securityfocus.com/archive/1/449301/100/0/threaded http://www.securityfocus.com/bid/20635 http://www.vupen.com/english/advisories/2006/4117 https •
CVE-2006-4265
https://notcve.org/view.php?id=CVE-2006-4265
Kaspersky Anti-Hacker 1.8.180, when Stealth Mode is enabled, allows remote attackers to obtain responses to ICMP (1) timestamp and (2) netmask requests, which is inconsistent with the documented behavior of Stealth Mode. Kaspersky Anti-Hacker 1.8.180, cuando está activado el Modo Oculto (Stealth Mode), permite a atacantes remotos obtener respuestas a peticiones ICMP de (1) marca de tiempo (timestamp) y (2) máscara de red (netmask), lo cual es inconsistente con el comportamiento documentado del Modo Oculto. • http://securityreason.com/securityalert/1427 http://www.securityfocus.com/archive/1/443180/100/100/threaded •