F-Secure Anti-Virus Client Security 6.02 Format String Vulnerability

2007.03.26
Credit: Deral Heiland
Risk: High
Local: Yes
Remote: No
CWE: CWE-Other


CVSS Base Score: 7.2/10
Impact Subscore: 10/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

================================================= Layered Defense Research Advisory 18 March 2007 ================================================= 1) Affected Software F-Secure Anti-Virus Client Security Version 6.02 ================================================= 2) Severity Rating: Low risk Impact: Local read write arbitrary memory, denial of service. ================================================= 3) Description of Vulnerability A format string vulnerability was discovered within F-Secure Anti-Virus Client Security Version 6.02. The vulnerability is due to improper processing of format strings when processing Management Server name field. When special crafted format strings are entered into the Management Server name field under Communication settings an attacker can read/write arbitrary memory and at a minimum can cause a denial of service condition. ================================================= 4) Solution Fix: http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-cs-hotfi xes.shtml ================================================= 5) Time Table: 11/20/2006 Reported Vulnerability to Vendor. 11/29/2007 Vendor acknowledged the vulnerability 03/01/2007 Vendor published hot fix ================================================= 6) Credits Discovered by Deral Heiland, www.LayeredDefense.com ================================================= 7) Reference ================================================= 8) About Layered Defense Layered Defense, Is a group of security professionals that work together on ethical Research, Testing and Training within the information security arena. http://www.layereddefense.com =================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top