RSS   Vulnerabilities for 'Kaspersky anti-virus personal'   RSS



Kaspersky Anti-Virus 5.0 (5.0.712); Antivirus Personal 5.0.x; Anti-Virus 6.0 (, 7 (, 2009 (8.0.0.x), and 2010 (; and Internet Security 7 (, 2009 (8.0.0.x), and 2010 (; use weak permissions (Everyone:Full Control) for the BASES directory, which allows local users to gain SYSTEM privileges by replacing an executable or DLL with a Trojan horse.



The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers for in Kaspersky Labs Anti-Virus and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.



Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file.



Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header.



The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs.


 >>> Vendor: Kaspersky lab 15 Products
Kaspersky anti-virus
Kaspersky anti-hacker
Kaspersky anti-virus personal
Kaspersky anti-virus personal pro
Kaspersky personal security suite
Kaspersky internet security
Kaspersky antivirus engine
Kaspersky anti-spam
Online scanner
Kaspersky anti-virus 5.5 for check point firewall-
Kaspersky internet security suite
Kaspersky anti-virus 2009
Kaspersky anti-virus 2010
Kaspersky internet security 2009
Kaspersky internet security 2010

Copyright 2019,


Back to Top