Page 3 of 30 results (0.007 seconds)

CVSS: 10.0EPSS: 4%CPEs: 19EXPL: 0

Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070522 allow remote attackers to cause a denial of service (file scanning infinite loop) via certain crafted (1) ARJ archives or (2) FSG packed files. Varios productos antivirus de F-Secure para Microsoft Windows y Linux anterior a versión 20070522, permiten a los atacantes remotos causar una denegación de servicio (bucle infinito de escaneo de archivos) por medio de ciertos archivos ARJ (1) o (2) archivos empaquetados FSG. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063714.html http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063715.html http://osvdb.org/36725 http://osvdb.org/36726 http://secunia.com/advisories/25440 http://securitytracker.com/id?1018147 http://www.f-secure.com/security/fsc-2007-3.shtml http://www.nruns.com/security_advisory_fsecure_arj.php http://www.nruns.com/security_advisory_fsecure_fsg.php http://www.securityfocus.com/archive/1/470462/ • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and "access validation of the address space." Vulnerabilidad sin especificar en el componente Real-time Scanning en múltiples productos de F-Secure, incluyendo Internet Security 2005, 2006 y2007; Anti-Virus 2005, 2006 y 2007 y Solutions basadas en F-Secure Protection Service for Consumers 6.40 y versiones anteriores permite a usuarios locales obtener privilegios a través de paquetes de petición I/O (IRP) manipulados, relacionado con el IOCTL (Control de Entrada/Salida) y "Validación del acceso al espacio de direcciones". • http://osvdb.org/36727 http://secunia.com/advisories/25439 http://www.f-secure.com/security/fsc-2007-2.shtml http://www.securitytracker.com/id?1018146 http://www.securitytracker.com/id?1018148 http://www.vupen.com/english/advisories/2007/1985 https://exchange.xforce.ibmcloud.com/vulnerabilities/34579 •

CVSS: 7.6EPSS: 5%CPEs: 5EXPL: 0

Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host. • http://secunia.com/advisories/20407 http://securitytracker.com/id?1016196 http://securitytracker.com/id?1016197 http://www.f-secure.com/security/fsc-2006-3.shtml http://www.vupen.com/english/advisories/2006/2076 https://exchange.xforce.ibmcloud.com/vulnerabilities/26799 •

CVSS: 7.5EPSS: 17%CPEs: 63EXPL: 0

Buffer overflow in multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allows remote attackers to execute arbitrary code via crafted ZIP archives. • http://secunia.com/advisories/18529 http://securitytracker.com/id?1015507 http://securitytracker.com/id?1015508 http://securitytracker.com/id?1015509 http://securitytracker.com/id?1015510 http://www.ciac.org/ciac/bulletins/q-103.shtml http://www.f-secure.com/security/fsc-2006-1.shtml http://www.osvdb.org/22632 http://www.securityfocus.com/bid/16309 http://www.vupen.com/english/advisories/2006/0257 https://exchange.xforce.ibmcloud.com/vulnerabilities/24198 •

CVSS: 5.0EPSS: 1%CPEs: 54EXPL: 0

Multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allow remote attackers to hide arbitrary files and data via malformed (1) RAR and (2) ZIP archives, which are not properly scanned. • http://secunia.com/advisories/18529 http://securitytracker.com/id?1015507 http://securitytracker.com/id?1015508 http://securitytracker.com/id?1015509 http://securitytracker.com/id?1015510 http://www.ciac.org/ciac/bulletins/q-103.shtml http://www.f-secure.com/security/fsc-2006-1.shtml http://www.osvdb.org/22633 http://www.securityfocus.com/bid/16309 http://www.vupen.com/english/advisories/2006/0257 https://exchange.xforce.ibmcloud.com/vulnerabilities/24199 •