The vulnerability is due to improper bounds checking that may result in a multi-byte heap buffer overwflow write. For a description of this vulnerability, see the ClamAV blog.Ī vulnerability in the regex module used by the signature database load module of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an authenticated, local attacker to crash ClamAV at database load time, and possibly gain code execution. On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 9.0.Ī link following privilege escalation vulnerability in Trend Micro Antivirus for Max and below could allow a local attacker to modify a file during the update process and escalate their privileges. ESET Mail Security for IBM Domino 6.0 versions prior to 1.0. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 0.0. ESET File Security for Microsoft Windows Server 3.0. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 2.0. ESET Endpoint Security 6.0 versions prior to. ESET Endpoint Antivirus 6.0 versions prior to. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. Privilege escalation vulnerability in Windows products of ESET, spol. Credits: Georgy Zaytsev (Positive Technologies). Kaspersky Anti-Virus products for home and Kaspersky Endpoint Security with antivirus databases released before 12 March 2022 had a bug in a data parsing module that potentially allowed an attacker to execute arbitrary code. Please note that an attacker must at least have low-level privileges on the system to attempt to exploit this vulnerability. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder.Ī link following vulnerability in Trend Micro Antivirus for Mac 11.5 could allow an attacker to create a specially-crafted file as a symlink that can lead to privilege escalation. has a quarantine flaw that allows privilege escalation.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |