CVE-2023-1446 – Watchdog Anti-Virus IoControlCode wsdk-driver.sys 0x80002008 denial of service
https://notcve.org/view.php?id=CVE-2023-1446
A vulnerability classified as problematic was found in Watchdog Anti-Virus 1.4.214.0. Affected by this vulnerability is the function 0x80002004/0x80002008 in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. • https://drive.google.com/file/d/1zjK_DMjHz41RMpfa0iLQ4GXKQwEr4z2T/view https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1446 https://vuldb.com/?ctiid.223291 https://vuldb.com/?id.223291 • CWE-404: Improper Resource Shutdown or Release CWE-476: NULL Pointer Dereference •
CVE-2022-38582
https://notcve.org/view.php?id=CVE-2022-38582
Incorrect access control in the anti-virus driver wsdkd.sys of Watchdog Antivirus v1.4.158 allows attackers to write arbitrary files. El control de acceso incorrecto en el controlador antivirus wsdkd.sys de Watchdog Antivirus v1.4.158 permite a los atacantes escribir archivos arbitrarios. • https://gist.github.com/420SmokeBigWeedHackBadDrivers/53de9ff97d95fc3e79307345fddb0a30 •
CVE-2022-38611
https://notcve.org/view.php?id=CVE-2022-38611
Incorrect access control in Watchdog Anti-Virus v1.4.158 allows attackers to perform a DLL hijacking attack and execute arbitrary code via a crafted binary. El control de acceso incorrecto en Watchdog Anti-Virus versión v1.4.158, permite a atacantes llevar a cabo un ataque de secuestro de DLL y ejecutar código arbitrario por medio de un binario diseñado • https://gist.github.com/dru1d-foofus/835423de77c3522d53b9e7bdf5a28dfe •
CVE-2022-27534
https://notcve.org/view.php?id=CVE-2022-27534
Kaspersky Anti-Virus products for home and Kaspersky Endpoint Security with antivirus databases released before 12 March 2022 had a bug in a data parsing module that potentially allowed an attacker to execute arbitrary code. The fix was delivered automatically. Credits: Georgy Zaytsev (Positive Technologies). Kaspersky Anti-Virus products for home and Kaspersky Endpoint Security with antivirus databases lanzados antes del 12 de marzo de 2022, tenían un error en un módulo de análisis de datos que potencialmente permitía a un atacante ejecutar código arbitrario. La corrección fue realizada de forma automática. • https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_2 •
CVE-2021-27223
https://notcve.org/view.php?id=CVE-2021-27223
A denial-of-service issue existed in one of modules that was incorporated in Kaspersky Anti-Virus products for home and Kaspersky Endpoint Security. A local user could cause Windows crash by running a specially crafted binary module. The fix was delivered automatically. Credits: (Straghkov Denis, Kurmangaleev Shamil, Fedotov Andrey, Kuts Daniil, Mishechkin Maxim, Akolzin Vitaliy) @ ISPRAS Se presentaba un problema de denegación de servicio en uno de los módulos incorporados en los productos Kaspersky Anti-Virus for home y Kaspersky Endpoint Security. Un usuario local podía causar el bloqueo de Windows al ejecutar un módulo binario especialmente diseñado. • https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_1 •