CVE-2006-4926
Kaspersky Internet Security 6.0.0.303 - IOCTL KLICK Local Overflow / Local Privilege Escalation
Severity Score
7.2
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.
El NDIS-TDI Hooking Engine, según lo utilizado en (1) KLICK (KLICK.SYS) y (2) KLIN (KLIN.SYS) en los controladores de dispositivos 2.0.0.281 en Kaspersky Labs Anti-Virus 6.0.0.303 y otros antivirus o productos de seguridad de Internet, permite a un usuario local ejecutar código de su elección a través de un estructura Irp artesanal con una dirección inválida en 0x80052110 IOCTL.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2006-09-22 CVE Reserved
- 2006-10-20 CVE Published
- 2006-10-29 First Exploit
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/archive/1/449289/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/449301/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2006/4117 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29677 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/2676 | 2006-10-29 | |
http://securitytracker.com/id?1017093 | 2024-08-07 | |
http://www.osvdb.org/29891 | 2024-08-07 | |
http://www.securityfocus.com/bid/20635 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425 | 2018-10-17 | |
http://secunia.com/advisories/22478 | 2018-10-17 | |
http://www.kaspersky.com/technews?id=203038678 | 2018-10-17 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Kaspersky Lab Search vendor "Kaspersky Lab" | Kaspersky Anti-virus Search vendor "Kaspersky Lab" for product "Kaspersky Anti-virus" | 5.0 Search vendor "Kaspersky Lab" for product "Kaspersky Anti-virus" and version "5.0" | windows_workstations |
Affected
| ||||||
Kaspersky Lab Search vendor "Kaspersky Lab" | Kaspersky Anti-virus Search vendor "Kaspersky Lab" for product "Kaspersky Anti-virus" | 6.0 Search vendor "Kaspersky Lab" for product "Kaspersky Anti-virus" and version "6.0" | workstations |
Affected
| ||||||
Kaspersky Lab Search vendor "Kaspersky Lab" | Kaspersky Anti-virus Personal Search vendor "Kaspersky Lab" for product "Kaspersky Anti-virus Personal" | 5.0 Search vendor "Kaspersky Lab" for product "Kaspersky Anti-virus Personal" and version "5.0" | - |
Affected
| ||||||
Kaspersky Lab Search vendor "Kaspersky Lab" | Kaspersky Anti-virus Personal Pro Search vendor "Kaspersky Lab" for product "Kaspersky Anti-virus Personal Pro" | 5.0 Search vendor "Kaspersky Lab" for product "Kaspersky Anti-virus Personal Pro" and version "5.0" | - |
Affected
| ||||||
Kaspersky Lab Search vendor "Kaspersky Lab" | Kaspersky Internet Security Search vendor "Kaspersky Lab" for product "Kaspersky Internet Security" | 6.0 Search vendor "Kaspersky Lab" for product "Kaspersky Internet Security" and version "6.0" | maintenance_pack_2 |
Affected
|