Page 2 of 17 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024. Desbordamiento de búfer basado en memoria dinámica (heap) en aswRdr.sys (también conocido como el controlador TDI RDR) en avast! Home y Professional v4.8.1356.0, permite a usuarios locales provocar una denegación de servicio (corrupción de memoria) o posiblemente elevar sus privilegios a través de argumentos manipulados a IOCTL 0x80002024. • https://www.exploit-db.com/exploits/33360 https://github.com/fengjixuchui/CVE-2009-4049 http://secunia.com/advisories/37368 http://www.efblog.net/2009/11/avast-aswrdrsys-kernel-pool-corruption.html http://www.securityfocus.com/archive/1/507891/100/0/threaded http://www.securityfocus.com/bid/37031 http://www.vupen.com/english/advisories/2009/3266 https://www.evilfingers.com/advisory/Advisory/Avast_aswRdr_sys_Kernel_Pool_Corruption_and_Local_Privilege_Escalation.php • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 29EXPL: 0

Unspecified vulnerability in ashWsFtr.dll in avast! Home and Professional for Windows before 4.8.1356 has unknown impact and local attack vectors. Vulnerabilidad inesperada en ashWsFtr.dll en avast! Home y Professional para Windows anterior v4.8.1356 tiene un impacto y vectores de ataque no especificados. • http://osvdb.org/58403 http://secunia.com/advisories/36858 http://www.avast.com/eng/avast-4-home_pro-revision-history.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6509 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

Stack-based buffer overflow in aswMon2.sys in avast! Home and Professional for Windows 4.8.1351, and possibly other versions before 4.8.1356, allows local users to cause a denial of service (system crash) and possibly gain privileges via a crafted IOCTL request to IOCTL 0xb2c80018. Desbordamiento de búfer basado en pila en aswMon2.sys en avast! Home y Professional para Windows v4.8.1351, y probablemente otras versiones anteriores v4.8.1356, permite a usuarios locales causar una denegación de servicios (caída sistema) y probablemente obtener privilegios a través de peticiones IOCTL manipuladas en IOCTL 0xb2c80018. • https://www.exploit-db.com/exploits/10106 http://osvdb.org/58402 http://secunia.com/advisories/36858 http://www.avast.com/eng/avast-4-home_pro-revision-history.html http://www.securityfocus.com/archive/1/506681/100/0/threaded http://www.securityfocus.com/bid/36507 http://www.securitytracker.com/id?1022940 http://www.vupen.com/english/advisories/2009/2761 https://exchange.xforce.ibmcloud.com/vulnerabilities/53456 https://oval.cisecurity.org/repository/search/definition/oval%3Aor • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.9EPSS: 0%CPEs: 29EXPL: 2

aavmKer4.sys in avast! Home and Professional for Windows before 4.8.1356 does not properly validate input to IOCTLs (1) 0xb2d6000c and (2) 0xb2d60034, which allows local users to gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption, a different vulnerability than CVE-2008-1625. aavmKer4.sys en avast! Home y Professional para Windows anterior v4.8.1356 no proporciona entradas validad en IOCTLs (1) 0xb2d6000c y (2) 0xb2d60034, que permite a usuarios locales obtener privilegios a través de peticiones IOCTL usando direcciones de kernel manipuladas que lanzan una caída de memoria, una vulnerabilidad diferente que CVE-2008-1625. • https://www.exploit-db.com/exploits/12406 http://secunia.com/advisories/36858 http://www.avast.com/eng/avast-4-home_pro-revision-history.html http://www.ntinternals.org/ntiadv0904/ntiadv0904.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6024 • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 4%CPEs: 3EXPL: 0

Multiple stack-based buffer overflows in avast! Linux Home Edition 1.0.5, 1.0.5-1, and 1.0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via a malformed (1) ISO or (2) RPM file. Múltiple desbordamiento de búfer basado en pila en avast! Linux Home Edition v1.0.5, v1.0.5-1, y v1.0.8 que permite a los atacantes remotos causar una denegación de servicio (caída de la aplicación) o ejecutar arbitrariamente código a través de ficheros malformados (1) ISO o (2) RPM. • http://osvdb.org/52016 http://www.ivizsecurity.com/security-advisory-iviz-sr-08013.html http://www.securityfocus.com/archive/1/499080/100/0/threaded http://www.securityfocus.com/bid/32747 http://www.vupen.com/english/advisories/2008/3460 https://exchange.xforce.ibmcloud.com/vulnerabilities/47251 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •