CVE-2021-35053 – Kaspersky Total Security Directory Traversal Denial-of-Service Vulnerability
https://notcve.org/view.php?id=CVE-2021-35053
Possible system denial of service in case of arbitrary changing Firefox browser parameters. An attacker could change specific Firefox browser parameters file in a certain way and then reboot the system to make the system unbootable. Una posible denegación de servicio del sistema en caso de cambio arbitrario de los parámetros del navegador Firefox. Un atacante podría cambiar un archivo específico de parámetros del navegador Firefox de una manera determinada y luego reiniciar el sistema para hacer que el sistema no pueda arrancar This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Kaspersky Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within Kaspersky Lab Launcher. • https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021 https://www.zerodayinitiative.com/advisories/ZDI-21-1280 https://www.zerodayinitiative.com/advisories/ZDI-22-431 •
CVE-2020-26200
https://notcve.org/view.php?id=CVE-2020-26200
A component of Kaspersky custom boot loader allowed loading of untrusted UEFI modules due to insufficient check of their authenticity. This component is incorporated in Kaspersky Rescue Disk (KRD) and was trusted by the Authentication Agent of Full Disk Encryption in Kaspersky Endpoint Security (KES). This issue allowed to bypass the UEFI Secure Boot security feature. An attacker would need physical access to the computer to exploit it. Otherwise, local administrator privileges would be required to modify the boot loader component. • https://github.com/CVEProject/cvelist/blob/master/2020/26xxx/CVE-2020-26200.json https://support.kaspersky.com/general/vulnerability.aspx?el=12430#170221 • CWE-287: Improper Authentication •
CVE-2020-6021
https://notcve.org/view.php?id=CVE-2020-6021
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DLL in the repair folder which will run with the Endpoint client’s privileges. Check Point Endpoint Security Client para Windows versiones anteriores a E84.20, permite un acceso de escritura al directorio desde el cual la reparación de la instalación toma lugar. Dado que MS Installer permite a usuarios habituales ejecutar la reparación, un atacante puede iniciar la reparación de la instalación y colocar una DLL especialmente diseñada en la carpeta de reparación que se ejecutará con los privilegios del cliente de Endpoint • https://supportcontent.checkpoint.com/solutions?id=sk170512 • CWE-427: Uncontrolled Search Path Element •
CVE-2020-6014
https://notcve.org/view.php?id=CVE-2020-6014
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate. Check Point Endpoint Security Client para Windows, con blades Anti-Bot o Threat Emulation instalados, antes de la versión E83.20, intenta cargar una DLL que no existe durante una consulta para el Domain Name. Un atacante con privilegios de administrador puede aprovechar esto para conseguir una ejecución de código dentro de un binario firmado de Check Point Software Technologies, donde bajo determinadas circunstancias puede hacer que el cliente finalice • https://supportcontent.checkpoint.com/solutions?id=sk168081 • CWE-114: Process Control CWE-426: Untrusted Search Path •
CVE-2019-8461
https://notcve.org/view.php?id=CVE-2019-8461
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user. Check Point Endpoint Security Initial Client para Windows versión anterior a E81.30, intenta cargar una biblioteca DLL localizada en cualquier ubicación de RUTA (PATH) en una imagen limpia sin el Endpoint Client instalado. Un atacante puede aprovechar esto para conseguir LPE usando una DLL especialmente diseñada localizada en cualquier ubicación de RUTA (PATH) accesible con permisos de escritura para el usuario. • https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk160812 • CWE-114: Process Control CWE-426: Untrusted Search Path •