30 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

01 Mar 2022 — A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Linux Security whereby the Fmlib component used in certain F-Secure products can crash while scanning fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine. Se ha detectado una vulnerabilidad de denegación de servicio (DoS) en F-Secure Linux Security por la que el componente Fmlib usado en determinados productos de F-Secure puede bloquearse mientras s... • https://www.f-secure.com/en/business/support-and-downloads/security-advisories •

CVSS: 5.3EPSS: 0%CPEs: 8EXPL: 0

09 Feb 2022 — A vulnerability affecting F-Secure antivirus engine before Capricorn update 2022-02-01_01 was discovered whereby decompression of ACE file causes the scanner service to stop. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine. Se ha detectado una vulnerabilidad que afecta al motor antivirus de F-Secure versiones anteriores a la actualización 2022-02-01_01 de Capricorn, por la que una descompresión del archivo ACE causa la ... • https://www.f-secure.com/en/business/support-and-downloads/security-advisories •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

28 Sep 2021 — A vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. An authenticated user can modify settings through the web user interface in a way that could lead to an arbitrary code execution on the F-Secure Internet Gatekeeper server. Se ha detectado una vulnerabilidad en la interfaz de usuario web de F-Secure Internet Gatekeeper. Un usuario autenticado puede modificar la configuración mediante la interfaz de usuario web de forma que podría conllevar una ejecución de código arbit... • https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

28 Sep 2021 — A denial-of-service (DoS) vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. The vulnerability occurs because of an attacker can trigger assertion via malformed HTTP packet to web interface. An unauthenticated attacker could exploit this vulnerability by sending a large username parameter. A successful exploitation could lead to a denial-of-service of the product. Se ha detectado una vulnerabilidad de denegación de servicio (DoS) en la interfaz de usuario web de F-Secure... • https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame • CWE-617: Reachable Assertion •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

22 Feb 2020 — The F-Secure AV parsing engine before 2020-02-05 allows virus-detection bypass via crafted Compression Method data in a GZIP archive. This affects versions before 17.0.605.474 (on Linux) of Cloud Protection For Salesforce, Email and Server Security, and Internet GateKeeper. El motor de análisis de F-Secure AV antes del 05-02-2020, permite omitir la detección de virus mediante datos de Compression Method diseñados en un archivo GZIP. Esto afecta a las versiones anteriores a 17.0.605.474 (en Linux) de Cloud P... • http://packetstormsecurity.com/files/156506/F-SECURE-Generic-Malformed-Container-Bypass.html • CWE-436: Interpretation Conflict •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

18 Feb 2011 — F-Secure Internet Gatekeeper for Linux 3.x before 3.03 does not require authentication for reading access logs, which allows remote attackers to obtain potentially sensitive information via a TCP session on the admin UI port. F-Secure Internet Gatekeeper para Linux 3.x antes de v3.03 no requiere autenticación para la lectura de registros de acceso, lo que permite a atacantes remotos obtener información sensible a través de una sesión TCP en el puerto de administración de la interfaz de usuario. • http://jvn.jp/en/jp/JVN71542734/index.html • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 168EXPL: 0

15 Apr 2010 — F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client S... • http://secunia.com/advisories/39396 •

CVSS: 6.8EPSS: 0%CPEs: 19EXPL: 0

22 May 2009 — Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive. Múltiples productos antivirus F-Secure, incluidos: Anti-Virus for Microsoft Exchange v7.10 y anteriores... • http://secunia.com/advisories/35008 •

CVSS: 9.3EPSS: 1%CPEs: 58EXPL: 0

20 Jun 2007 — Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive. Múltiples productos antivirus de F-Secure para Microsoft Windows y Linux anterior al 19/06/2007 permiten a atacantes remotos evitar el escaneo mediante una cabecera artesanal en un archivo (1) LHA o (2) RAR. • http://osvdb.org/36728 •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

31 May 2007 — Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and "access validation of the address space." Vulnerabilidad sin especificar en el componente Real-time Scanning en múltiples productos de... • http://osvdb.org/36727 •