4 results (0.005 seconds)

CVSS: 6.8EPSS: 0%CPEs: 13EXPL: 2

Kaspersky Anti-Virus 5.0 (5.0.712); Antivirus Personal 5.0.x; Anti-Virus 6.0 (6.0.3.837), 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); and Internet Security 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); use weak permissions (Everyone:Full Control) for the BASES directory, which allows local users to gain SYSTEM privileges by replacing an executable or DLL with a Trojan horse. Kaspersky Anti-Virus v5.0 (v5.0.712); Antivirus Personal v5.0.x; Anti-Virus v6.0 (v6.0.3.837), v7 (v7.0.1.325), 2009 (v8.0.0.x), and 2010 (v9.0.0.463); y Internet Security v7 (v7.0.1.325), 2009 (v8.0.0.x), and 2010 (v9.0.0.463); usan permisos débiles (Todo el mundo: Control Total) en el directorio BASES, lo que permite a usuarios locales obtener privilegios de SYSTEM sustituyendo un ejecutable o DLL con un caballo de troya. • https://www.exploit-db.com/exploits/10484 http://secunia.com/advisories/37398 http://secunia.com/advisories/37730 http://www.exploit-db.com/exploits/10484 http://www.securityfocus.com/archive/1/508508/100/0/threaded http://www.securitytracker.com/id?1023366 http://www.securitytracker.com/id?1023367 http://www.vupen.com/english/advisories/2009/3573 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 4

kl1.sys in Kaspersky Anti-Virus 2010 9.0.0.463, and possibly other versions before 9.0.0.736, does not properly validate input to IOCTL 0x0022c008, which allows local users to cause a denial of service (system crash) via IOCTL requests using crafted kernel addresses that trigger memory corruption, possibly related to klavemu.kdl. kl1.sys en Kaspersky Anti-Virus 2010 v9.0.0.463, y posiblemente otras versiones anteriores a la v9.0.0.736, no valida apropiadamente la entrada a IOCTL 0x0022c008, lo que permite a usuarios locales provocar una denegación de servicio (caída del sistema) a través de una petición IOCTL usando direcciones de kernel modificadas que provocan una corrupción de memoria, posiblemente relacionado con klavemu.kdl. • https://www.exploit-db.com/exploits/10164 http://osvdb.org/60207 http://secunia.com/advisories/37398 http://sysdream.com/article.php?story_id=323&section_id=78 http://www.securityfocus.com/archive/1/507933/100/0/threaded http://www.securityfocus.com/bid/37044 http://www.securitytracker.com/id?1023198 http://www.vupen.com/english/advisories/2009/3286 https://exchange.xforce.ibmcloud.com/vulnerabilities/54309 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 4

avp.exe in Kaspersky Internet Security 9.0.0.459 and Anti-Virus 9.0.0.463 allows remote attackers to cause a denial of service (CPU consumption and network connectivity loss) via an HTTP URL request that contains a large number of dot "." characters. avp.exe en Kaspersky Internet Security v9.0.0.459 y Anti-Virus v9.0.0.463 permite a atacantes remotos producir una denegación de servicio (consumo de CPU y perdida de conectividad con la red) a través de una petición de URL HTTP que contiene un gran numero de puntos ".". • https://www.exploit-db.com/exploits/9537 http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0252.html http://secunia.com/advisories/36405 http://securityreason.com/achievement_securityalert/66 http://www.h-online.com/security/Kaspersky-confirm-and-close-DoS-vulnerability--/news/114077 http://www.osvdb.org/57173 http://www.securityfocus.com/bid/36084 http://www.securitytracker.com/id?1022754 http://www.securitytracker.com/id?1022755 https://exchange.xforce.ibmcloud.com/vulnerab • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 2

Buffer overflow in klim5.sys in Kaspersky Anti-Virus for Workstations 6.0 and Anti-Virus 2008 allows local users to gain privileges via an IOCTL 0x80052110 call. Desbordamiento de búfer en klim5.sys de Kaspersky Anti-Virus for Workstations v6.0 y Anti-Virus 2008, permite a usuarios locales obtener privilegios a través de una llamada IOCTL 0x80052110. • https://www.exploit-db.com/exploits/32771 http://kartoffel.reversemode.com/downloads/kaspersky_klim5_plugin.zip http://secunia.com/advisories/33788 http://www.reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1 http://www.securityfocus.com/archive/1/500606/100/0/threaded http://www.securityfocus.com/bid/33561 http://www.securitytracker.com/id?1021661 http://www.wintercore.com/advisories/advisory_W020209.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •