Kaspersky patches series of vulnerabilities

Posted by   Virus Bulletin on   Apr 5, 2007

ActiveX and overflow issues allowed remote data theft, local system attacks.

Several vulnerabilities have been revealed in many Kaspersky security products, including ActiveX flaws which could expose data, allowing files to be accessed or stolen by remote malicious attackers, and other flaws which could allow malicious local users to bypass security, escalate local privileges and cause denial of service from the product.

The ActiveX flaws, caused by the use of insecure methods in the ActiveX implementation within the product, could allow sites carrying an exploit to access local files, and to transfer them via anonymous FTP. Exploitation would require the user to visit such a maliciously designed site.

The other vulnerabilities, involving heap overflows in several components including the 'anti-hacker' protection provided by some products and resulting memory corruption, could be used to gain privileged system access and to disable protection. These flaws could only be exploited by a local user.

The flaws, which affect several versions of Kaspersky Anti-Virus as well as Kaspersky Internet Security, were variously discovered by iDefense, Tipping Point's Zero Day Initiative, and Kaspersky themselves. All have now been patched in the latest updates to the affected products, and users are advised to ensure they are running the latest versions of all software.

Details from Kaspersky are here and here, and alerts from iDefense are here and here. A further advisory from Secunia, marked 'highly critical', is here.

Posted on 05 April 2007 by Virus Bulletin

 Tags

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.