CVE-2017-8776
https://notcve.org/view.php?id=CVE-2017-8776
Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 have approximately 165 PE files in the default installation that do not use ASLR/DEP protection mechanisms that provide sufficient defense against directed attacks against the product. Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, y Quick Heal AntiVirus Pro 10.1.0.316 tienen unos 165 archivos PE en la instalación por defecto que no utilizan protección ASLR/DEP. • http://payatu.com/quick-heal-antivirus-protection-mechanism-failure-vulnerability •
CVE-2015-8285 – QuickHeal 16.00 - 'webssx.sys' Driver Denial of Service
https://notcve.org/view.php?id=CVE-2015-8285
The webssx.sys driver in QuickHeal 16.00 allows remote attackers to cause a denial of service. El driver webssx.sys en QuickHeal 16.00 permite a atacantes remotos provocar una denegación de servicio. • https://www.exploit-db.com/exploits/39475 http://www.securityfocus.com/bid/97996 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-5005
https://notcve.org/view.php?id=CVE-2017-5005
Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earlier, Total Security 10.1.0.316 and earlier, and AntiVirus Pro 10.1.0.316 and earlier on OS X allows remote attackers to execute arbitrary code via a crafted LC_UNIXTHREAD.cmdsize field in a Mach-O file that is mishandled during a Security Scan (aka Custom Scan) operation. Desbordamiento de búfer basado en pila en Quick Heal Internet Security 10.1.0.316 y versiones anteriores, Total Security 10.1.0.316 y versiones anteriores y AntiVirus Pro 10.1.0.316 y versiones anteriores en OS X permite a atacantes remotos ejecutar código arbitrario a través de un campo LC_UNIXTHREAD.cmdsize manipulado en un archivo Mach-O que no es manejado correctamente durante una operación Security Scan (también conocido como Custom Scan). • http://www.securityfocus.com/bid/95194 http://www.securitytracker.com/id/1037547 https://github.com/payatu/QuickHeal https://www.youtube.com/watch?v=h9LOsv4XE00 • CWE-787: Out-of-bounds Write •
CVE-2013-6767 – QuickHeal AntiVirus 7.0.0.1 - Local Stack Overflow
https://notcve.org/view.php?id=CVE-2013-6767
Stack-based buffer overflow in pepoly.dll in Quick Heal AntiVirus Pro 7.0.0.1 allows local users to execute arbitrary code or cause a denial of service (process crash) via a long *.text value in a PE file. El desbordamiento de búfer en la región stack de la memoria en la biblioteca pepoly.dll en Quick Heal AntiVirus Pro versión 7.0.0.1, permite a los usuarios locales ejecutar código arbitrario o causar una denegación de servicio (bloqueo del proceso) por medio de un valor *.text largo en un archivo PE. • https://www.exploit-db.com/exploits/30374 http://osvdb.org/101130 http://packetstormsecurity.com/files/124477/QuickHeal-AntiVirus-7.0.0.1-Stack-Buffer-Overflow.html http://seclists.org/bugtraq/2013/Dec/90 http://www.exploit-db.com/exploits/30374 http://www.securityfocus.com/bid/64402 http://www.vulnerability-lab.com/get_content.php?id=1171 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2009-4556 – Quick Heal 10.00 SP1 - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2009-4556
Quick Heal AntiVirus Plus 2009 10.00 SP1 and Quick Heal Total Security 2009 10.00 SP1 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs, as demonstrated by replacing quhlpsvc.exe. Quick Heal AntiVirus Plus 2009 v10.00 SP1 y Quick Heal Total Security 2009 v10.00 SP1 emplean permisos débiles (Control Total para todos los usuarios) para los ficheros en producción, esto permite a usuarios locales obtener privilegios sustituyendo ficheros ejecutables por programas que tengan algún caballo de Troya, como se ha demostrado al reemplazar el archivo quhlpsvc.exe. • https://www.exploit-db.com/exploits/10084 http://secunia.com/advisories/37033 http://www.securityfocus.com/archive/1/507121/100/0/threaded http://www.securityfocus.com/bid/36662 https://exchange.xforce.ibmcloud.com/vulnerabilities/53746 • CWE-264: Permissions, Privileges, and Access Controls •