CVE-2015-1438
Panda Security 1.0.0.13 Arbitrary Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in Panda Security Kernel Memory Access Driver 1.0.0.13 allows attackers to execute arbitrary code with kernel privileges via a crafted size input for allocated kernel paged pool and allocated non-paged pool buffers.
Un desbordamiento de búfer en la región heap de la memoria en Panda Security Kernel Memory Access Driver versión 1.0.0.13, permite a los atacantes ejecutar código arbitrario con privilegios kernel por medio de una entrada de tamaño creado para los búferes de grupo no paginado asignado y de grupo paginado de kernel asignado.
Panda Kernel Memory Access Driver does not validate the size of data to be copied to both an allocated kernel paged pool buffer and to an allocated non-paged pool buffer. Furthermore, the attacker has control over the start-to-copy index regarding the non-paged pool buffer which allows an attacker to corrupt a kernel object with more precision, and control the EIP via a hijacked function pointer. Version 1.0.0.13 is affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-31 CVE Reserved
- 2015-07-11 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/132682/Panda-Security-1.0.0.13-Arbitrary-Code-Execution.html | Third Party Advisory |
|
http://seclists.org/fulldisclosure/2015/Jul/42 | Mailing List |
|
http://seclists.org/fulldisclosure/2015/Jul/61 | Mailing List |
|
http://www.securityfocus.com/bid/75715 | Third Party Advisory | |
https://tools.cisco.com/security/center/viewAlert.x?alertId=39908 | Third Party Advisory |
|
URL | Date | SRC |
---|---|---|
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-1438 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Panda Security Search vendor "Panda Security" | Panda Antivirus Pro 2015 Search vendor "Panda Security" for product "Panda Antivirus Pro 2015" | 1.0.0.13 Search vendor "Panda Security" for product "Panda Antivirus Pro 2015" and version "1.0.0.13" | - |
Affected
| ||||||
Panda Security Search vendor "Panda Security" | Panda Global Protection 2015 Search vendor "Panda Security" for product "Panda Global Protection 2015" | 1.0.0.13 Search vendor "Panda Security" for product "Panda Global Protection 2015" and version "1.0.0.13" | - |
Affected
| ||||||
Panda Security Search vendor "Panda Security" | Panda Gold Protection 2015 Search vendor "Panda Security" for product "Panda Gold Protection 2015" | 1.0.0.13 Search vendor "Panda Security" for product "Panda Gold Protection 2015" and version "1.0.0.13" | - |
Affected
| ||||||
Panda Security Search vendor "Panda Security" | Panda Internet Security 2015 Search vendor "Panda Security" for product "Panda Internet Security 2015" | 1.0.0.13 Search vendor "Panda Security" for product "Panda Internet Security 2015" and version "1.0.0.13" | - |
Affected
|