9 results (0.009 seconds)

CVSS: 7.8EPSS: 2%CPEs: 4EXPL: 0

Kaspersky AntiVirus Engine 6.0.1.411 for Windows and 5.5-10 for Linux allows remote attackers to cause a denial of service (CPU consumption) via a crafted UPX compressed file with a negative offset, which triggers an infinite loop during decompression. Kaspersky AntiVirus Engine 6.0.1.411 para Windows y 5.5-10 para Linux permite a atacantes remotos provocar una denegación de servicio (agotamiento de CPU) mediante un archivo comprimido con UPX manipulado con un desplazamiento (offset) negativo, lo cual dispara un bucle infinito durante la extracción. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=485 http://secunia.com/advisories/24391 http://www.securityfocus.com/bid/22795 http://www.securitytracker.com/id?1017718 http://www.vupen.com/english/advisories/2007/0810 https://exchange.xforce.ibmcloud.com/vulnerabilities/32797 •

CVSS: 5.0EPSS: 4%CPEs: 2EXPL: 0

Kaspersky Labs Antivirus Engine 6.0 for Windows and 5.5-10 for Linux before 20070102 enter an infinite loop upon encountering an invalid NumberOfRvaAndSizes value in the Optional Windows Header of a portable executable (PE) file, which allows remote attackers to cause a denial of service (CPU consumption) by scanning a crafted PE file. Kaspersky Labs Antivirus Engine 6.0 para Windows y 5.5-10 para Linux anterior al 02/01/2007 entran en un bucle infinito tras encontrar un valor NumberOfRvaAndSizes inválido en la Cabecera Opcional de Windows (Optional Windows Header) de un ejecutable portátil (Portable Executable o PE), lo cual permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) con el escaneo de un archivo PE manipulado. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=459 http://osvdb.org/32588 http://secunia.com/advisories/23575 http://securitytracker.com/id?1017476 http://www.securityfocus.com/bid/21901 http://www.vupen.com/english/advisories/2007/0067 https://exchange.xforce.ibmcloud.com/vulnerabilities/31315 •

CVSS: 7.5EPSS: 2%CPEs: 47EXPL: 2

Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. El módulo Perl Archive::Zip anterior a 1.14, cuando se usa en programas antivirus como amavisd-new, permite a atacantes remotos saltarse la protección del antivirus mediante un ficheros comprimido con cabeceras globales y locales establecido a cero, lo que no impide que el fichero comprimido sea abierto en un sistema objetivo. • https://www.exploit-db.com/exploits/629 http://secunia.com/advisories/13038 http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/492545 http://www.mandriva.com/security/advisories?name=MDKSA-2004:118 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •

CVSS: 7.5EPSS: 95%CPEs: 48EXPL: 2

Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •

CVSS: 7.5EPSS: 96%CPEs: 48EXPL: 2

Sophos Anti-Virus before 3.87.0, and Sophos Anti-Virus for Windows 95, 98, and Me before 3.88.0, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/968818 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •