Page 5 of 23 results (0.006 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

A denial of service vulnerability exists in the IOCTL handling functionality of Kaspersky Internet Security KL1 driver. A specially crafted IOCTL signal can cause an access violation in KL1 kernel driver resulting in local system denial of service. An attacker can run a program from user-mode to trigger this vulnerability. Existe una vulnerabilidad de denegación de servicio en la funcionalidad de manejo IOCTL del controlador Kaspersky Internet Security KL1. Una señal IOCTL especialmente manipulada puede provocar una violación de acceso en el controlador del kernel KL1 resultando en una denegación de servicio en el sistema local. • http://securitytracker.com/id/1036702 http://www.securitytracker.com/id/1036702 http://www.securitytracker.com/id/1036703 http://www.talosintelligence.com/reports/TALOS-2016-0169 • CWE-284: Improper Access Control •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

A denial of service vulnerability exists in the syscall filtering functionality of the Kaspersky Internet Security KLIF driver. A specially crafted native api call request can cause a access violation exception in KLIF kernel driver resulting in local denial of service. An attacker can run program from user-mode to trigger this vulnerability. Existe una vulnerabilidad de denegación de servicio en la funcionalidad de filtrado syscall del controlador de Kaspersky Internet Security KLIF. Una petición de llamada api nativa especialmente manipulada puede provocar una excepción de violación de acceso en el controlador del kernel de KLIF resultando en una denegación de servicio local. • http://securitytracker.com/id/1036702 http://www.securitytracker.com/id/1036702 http://www.securitytracker.com/id/1036703 http://www.talosintelligence.com/reports/TALOS-2016-0166 • CWE-284: Improper Access Control •

CVSS: 6.8EPSS: 1%CPEs: 19EXPL: 0

Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive. Múltiples productos antivirus F-Secure, incluidos: Anti-Virus for Microsoft Exchange v7.10 y anteriores; Internet Gatekeeper for Windows v6.61 y anteriores, Windows v6.61 y anteriores, y Linux v2.16 y anteriores; Internet Security 2009 y anteriores, Anti-Virus 2009 y anteriores, Client Security v8.0 y anteriores y otros; permiten a atacantes remotos saltar la detección de software malicioso mediante archivos (1) .ZIP y (2) .RAR manipulados. • http://secunia.com/advisories/35008 http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html http://www.securityfocus.com/bid/34849 http://www.securitytracker.com/id?1022170 http://www.securitytracker.com/id?1022171 http://www.securitytracker.com/id?1022172 http://www.vupen.com/english/advisories/2009/1262 https://exchange.xforce.ibmcloud.com/vulnerabilities/50346 •