Page 7 of 37 results (0.006 seconds)

CVSS: 7.6EPSS: 6%CPEs: 41EXPL: 0

Integer overflow in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, when configured to scan inside compressed archives, allows remote attackers to execute arbitrary code via a crafted RPM compressed archive file, which triggers a buffer overflow. Desbordamiento de entero en múltiples productos antivirus de F-Secure, incluyendo Internet Security 2006 hasta 2008, Anti-Virus 2006 hasta 2008, y otros, cuando ha sido configurado para escanear ficheros comprimidos internamente, permite a atacantes remotos ejecutar código de su elección a través de un fichero comprimido RPM manipulado, lo que provocará un desbordamiento de búfer. • http://secunia.com/advisories/32352 http://www.f-secure.com/security/fsc-2008-3.shtml http://www.securityfocus.com/bid/31846 http://www.securitytracker.com/id?1021073 http://www.vupen.com/english/advisories/2008/2874 https://exchange.xforce.ibmcloud.com/vulnerabilities/46016 • CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 9%CPEs: 20EXPL: 0

Unspecified vulnerability in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, allows remote attackers to execute arbitrary code or cause a denial of service (hang or crash) via a malformed archive that triggers an unhandled exception, as demonstrated by the PROTOS GENOME test suite for Archive Formats. Vulnerabilidad no especificada en multiples productos anti-virus de F-Secure, incluidos Internet Security 2006 hasta 2008, Anti-Virus 2006 hasta 2008 y otros, permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (suspender o parar) utilizando un archivo defectuoso que provocará un excepción no manejada, como se ha demostrado por el paquete de pruebas PROTOS GENOME para formatos de archivo. • http://secunia.com/advisories/29397 http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-cs-hotfixes.shtml http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-mimesweeper-hotfixes.shtml http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive http://www.f-secure.com/security/fsc-2008-2.shtml http://www.securityfocus.com/bid/28282 http://www.securitytracker.com/id?1019618 http://www • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 1%CPEs: 20EXPL: 0

Multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, F-Secure Protection Service, and others, allow remote attackers to bypass malware detection via a crafted RAR archive. NOTE: this might be related to CVE-2008-0792. Múltiples productos antivirus de F-Secure, incluyendo Internet Security de 2006 a 2008, Anti-Virus de 2006 a 2008, F-Secure Protection Service y otros, permiten a atacantes remotos evitar las detecciones del malware a través de un archivo RAR manipulado. NOTA: podría estar relacionado con CVE-2008-0792. • http://secunia.com/advisories/28919 http://www.f-secure.com/security/fsc-2008-1.shtml http://www.securitytracker.com/id?1019405 http://www.securitytracker.com/id?1019412 http://www.securitytracker.com/id?1019413 http://www.vupen.com/english/advisories/2008/0544/references https://exchange.xforce.ibmcloud.com/vulnerabilities/40480 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.8EPSS: 0%CPEs: 20EXPL: 0

Multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, F-Secure Protection Service, and others, allow remote attackers to bypass malware detection via a crafted CAB archive. Múltiples productos antivirus F-Secure, incluyendo Internet Security 2006 hasta 2008, Anti-Virus 2006 hasta 2008, F-Secure Protection Service y otros, permiten a los atacantes remotos omitir la detección de malware por medio de un archivo CAB diseñado. • http://secunia.com/advisories/28919 http://www.f-secure.com/security/fsc-2008-1.shtml http://www.securitytracker.com/id?1019405 http://www.securitytracker.com/id?1019412 http://www.securitytracker.com/id?1019413 http://www.vupen.com/english/advisories/2008/0544/references https://exchange.xforce.ibmcloud.com/vulnerabilities/40480 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and "access validation of the address space." Vulnerabilidad sin especificar en el componente Real-time Scanning en múltiples productos de F-Secure, incluyendo Internet Security 2005, 2006 y2007; Anti-Virus 2005, 2006 y 2007 y Solutions basadas en F-Secure Protection Service for Consumers 6.40 y versiones anteriores permite a usuarios locales obtener privilegios a través de paquetes de petición I/O (IRP) manipulados, relacionado con el IOCTL (Control de Entrada/Salida) y "Validación del acceso al espacio de direcciones". • http://osvdb.org/36727 http://secunia.com/advisories/25439 http://www.f-secure.com/security/fsc-2007-2.shtml http://www.securitytracker.com/id?1018146 http://www.securitytracker.com/id?1018148 http://www.vupen.com/english/advisories/2007/1985 https://exchange.xforce.ibmcloud.com/vulnerabilities/34579 •