
CVE-2017-12816
https://notcve.org/view.php?id=CVE-2017-12816
25 Aug 2017 — In Kaspersky Internet Security for Android 11.12.4.1622, some of application exports activities have weak permissions, which might be used by a malware application to get unauthorized access to the product functionality by using Android IPC. En Kaspersky Internet Security para Android 11.12.4.1622, algunas de las actividades de exportación de aplicación tienen permisos débiles, lo que podría ser empleado por una aplicación malware para obtener acceso sin autorización a la funcionalidad de producto mediante ... • http://www.securityfocus.com/bid/100505 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2017-12817
https://notcve.org/view.php?id=CVE-2017-12817
25 Aug 2017 — In Kaspersky Internet Security for Android 11.12.4.1622, some of the application trace files were not encrypted. En Kaspersky Internet Security para Android 11.12.4.1622, algunos de los archivos de seguimiento de aplicación no estaban cifrados. • http://www.securityfocus.com/bid/100504 • CWE-311: Missing Encryption of Sensitive Data •

CVE-2017-8773
https://notcve.org/view.php?id=CVE-2017-8773
04 May 2017 — Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 are vulnerable to Out of Bounds Write on a Heap Buffer due to improper validation of dwCompressionSize of Microsoft WIM Header WIMHEADER_V1_PACKED. This vulnerability can be exploited to gain Remote Code Execution as well as Privilege Escalation. Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316 y Quick Heal AntiVirus Pro 10.1.0.316 son vulnerables a una escritur... • http://payatu.com/oob-write-heap-buffer-dwcompressionsize-ms-wim • CWE-787: Out-of-bounds Write •

CVE-2017-8774
https://notcve.org/view.php?id=CVE-2017-8774
04 May 2017 — Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 are vulnerable to Memory Corruption while parsing a malformed Mach-O file. Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316 y Quick Heal AntiVirus Pro 10.1.0.316 son vulnerables a una corrupción de memoria al analizar archivos Mach-O malformados. • http://payatu.com/quick-heal-internet-security-memory-corruption-vulnerability • CWE-787: Out-of-bounds Write •

CVE-2017-8775
https://notcve.org/view.php?id=CVE-2017-8775
04 May 2017 — Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 are vulnerable to Memory Corruption while parsing a malformed Mach-O file. Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, y Quick Heal AntiVirus Pro 10.1.0.316 son vulnerables a una corrupción de memoria al analizar archivos Mach-O malformados. • http://payatu.com/quick-heal-internet-security-memory-corruption-vulnerability-2 • CWE-787: Out-of-bounds Write •

CVE-2017-8776
https://notcve.org/view.php?id=CVE-2017-8776
04 May 2017 — Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 have approximately 165 PE files in the default installation that do not use ASLR/DEP protection mechanisms that provide sufficient defense against directed attacks against the product. Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, y Quick Heal AntiVirus Pro 10.1.0.316 tienen unos 165 archivos PE en la instalación por defecto que no utilizan protección ASLR/D... • http://payatu.com/quick-heal-antivirus-protection-mechanism-failure-vulnerability •

CVE-2017-5565
https://notcve.org/view.php?id=CVE-2017-5565
21 Mar 2017 — Code injection vulnerability in Trend Micro Maximum Security 11.0 (and earlier), Internet Security 11.0 (and earlier), and Antivirus+ Security 11.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Trend Micro process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL und... • http://cybellum.com/doubleagent-taking-full-control-antivirus • CWE-427: Uncontrolled Search Path Element •

CVE-2017-5566
https://notcve.org/view.php?id=CVE-2017-5566
21 Mar 2017 — Code injection vulnerability in AVG Ultimate 17.1 (and earlier), AVG Internet Security 17.1 (and earlier), and AVG AntiVirus FREE 17.1 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any AVG process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Executi... • http://cybellum.com/doubleagent-taking-full-control-antivirus • CWE-427: Uncontrolled Search Path Element •

CVE-2017-5567
https://notcve.org/view.php?id=CVE-2017-5567
21 Mar 2017 — Code injection vulnerability in Avast Premier 12.3 (and earlier), Internet Security 12.3 (and earlier), Pro Antivirus 12.3 (and earlier), and Free Antivirus 12.3 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Avast process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider... • http://cybellum.com/doubleagent-taking-full-control-antivirus • CWE-427: Uncontrolled Search Path Element •

CVE-2017-6186
https://notcve.org/view.php?id=CVE-2017-6186
21 Mar 2017 — Code injection vulnerability in Bitdefender Total Security 12.0 (and earlier), Internet Security 12.0 (and earlier), and Antivirus Plus 12.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Bitdefender process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Imag... • http://cybellum.com/doubleagent-taking-full-control-antivirus • CWE-94: Improper Control of Generation of Code ('Code Injection') •