Page 4 of 35 results (0.006 seconds)

CVSS: 7.5EPSS: 16%CPEs: 19EXPL: 0

Buffer overflow in the LHA decompression component in F-Secure anti-virus products for Microsoft Windows and Linux before 20070529 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted LHA archive, related to an integer wrap, a similar issue to CVE-2006-4335. Un desbordamiento de búfer en el componente de descompresión LHA en productos antivirus de F-Secure para Microsoft Windows y Linux anterior a versión 20070529, permite a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (bloqueo de la aplicación) por medio de un archivo LHA ??creado, relacionado con un ajuste de entero, un problema similar a CVE-2006-4335. • http://osvdb.org/36724 http://secunia.com/advisories/25426 http://securitytracker.com/id?1018147 http://www.f-secure.com/security/fsc-2007-1.shtml http://www.nruns.com/security_advisory_fsecure_lzh.php http://www.securityfocus.com/archive/1/470256/100/0/threaded http://www.securityfocus.com/bid/24235 http://www.securitytracker.com/id?1018146 http://www.securitytracker.com/id?1018148 http://www.vupen.com/english/advisories/2007/1985 https://exchange.xforce.ibmcloud.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and "access validation of the address space." Vulnerabilidad sin especificar en el componente Real-time Scanning en múltiples productos de F-Secure, incluyendo Internet Security 2005, 2006 y2007; Anti-Virus 2005, 2006 y 2007 y Solutions basadas en F-Secure Protection Service for Consumers 6.40 y versiones anteriores permite a usuarios locales obtener privilegios a través de paquetes de petición I/O (IRP) manipulados, relacionado con el IOCTL (Control de Entrada/Salida) y "Validación del acceso al espacio de direcciones". • http://osvdb.org/36727 http://secunia.com/advisories/25439 http://www.f-secure.com/security/fsc-2007-2.shtml http://www.securitytracker.com/id?1018146 http://www.securitytracker.com/id?1018148 http://www.vupen.com/english/advisories/2007/1985 https://exchange.xforce.ibmcloud.com/vulnerabilities/34579 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Format string vulnerability in F-Secure Anti-Virus Client Security 6.02 allows local users to cause a denial of service and possibly gain privileges via format string specifiers in the Management Server name field on the Communication settings page. Vulnerabilidad de cadena de formato en F-Secure Anti-Virus Client Security 6.02 permite a usuarios locales provocar denegación de servicio y posiblemente ganar privilegos a través de especificaciones de formato de cadena en el campo nombre de Management Server sobre la página de configuración de la comunicación. • http://osvdb.org/34764 http://securityreason.com/securityalert/2472 http://www.layereddefense.com/F-SecureMar18.html http://www.securityfocus.com/archive/1/463190/100/0/threaded http://www.securityfocus.com/bid/23023 http://www.vupen.com/english/advisories/2007/1055 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

F-Secure Anti-Virus for Linux Gateways 4.65 allows remote attackers to cause a denial of service (possibly fatal scan error), and possibly bypass virus detection, by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file. F-Secure Anti-Virus para Linux Gateways 4.65 permite a atacantes remotos provocar una denegación de servicio (posiblemente error fatal de escaneado), y posiblemente evitar una detección de virus, insertando caracteres inválidos en un contenido codificado base 64 en un fichero MIME multipart/mixed, como se demuestra con el fichero de testeo EICAR. • http://www.quantenblog.net/security/virus-scanner-bypass http://www.securityfocus.com/archive/1/453654/100/0/threaded http://www.securityfocus.com/bid/21461 •

CVSS: 5.0EPSS: 4%CPEs: 16EXPL: 0

F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier allows remote attackers to bypass anti-virus scanning via a crafted filename. F-Secure Anti-Virus de 2003 a 2006 y otras versiones, Internet Security de 2003 a 2006 y Service Platform para Service Providers 6.x y anteriores permite a atacantes remotos evitar la búsqueda antivirus a través de un nombre de archivo manipulado. • http://secunia.com/advisories/20858 http://securitytracker.com/id?1016400 http://securitytracker.com/id?1016401 http://www.f-secure.com/security/fsc-2006-4.shtml http://www.osvdb.org/26875 http://www.securityfocus.com/bid/18693 http://www.vupen.com/english/advisories/2006/2573 https://exchange.xforce.ibmcloud.com/vulnerabilities/27498 •