Kaspersky Lab

Kaspersky Anti-virus

28 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.31%
  • Veröffentlicht 20.10.2006 22:07:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary...

  • EPSS 0.94%
  • Veröffentlicht 09.03.2006 13:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Kaspersky Antivirus 5.0.5 and 5.5.3 allows remote attackers to cause a denial of service (CPU and memory consumption) via unknown attack vectors.

  • EPSS 0.06%
  • Veröffentlicht 18.11.2005 06:04:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Unquoted Windows search path vulnerability in Kaspersky Anti-Virus 5.0 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder.

  • EPSS 7.96%
  • Veröffentlicht 18.11.2005 06:04:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM...

  • EPSS 0.58%
  • Veröffentlicht 30.10.2005 14:34:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple interpretation error in Kaspersky 5.0.372 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a...

  • EPSS 0.41%
  • Veröffentlicht 14.10.2005 10:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple interpretation error in unspecified versions of Kaspersky Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be ope...

  • EPSS 21.2%
  • Veröffentlicht 05.10.2005 21:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 16.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Kaspersky Anti-Virus for Unix/Linux File Servers 5.0-5 uses world-writable permissions for the (1) log and (2) license directory, which allows local users to delete log files, append to arbitrary files via a symlink attack on kavmonitor.log, or delet...

  • EPSS 0.15%
  • Veröffentlicht 09.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs.

Exploit
  • EPSS 13.2%
  • Veröffentlicht 09.02.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Sophos Anti-Virus before 3.87.0, and Sophos Anti-Virus for Windows 95, 98, and Me before 3.88.0, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the c...