![]() An attacker can run program from user-mode to trigger this vulnerability. A specially crafted native api call request can cause a access violation exception in KLIF kernel driver resulting in local denial of service. An attacker can run program from user-mode to trigger this vulnerability.Ī denial of service vulnerability exists in the syscall filtering functionality of the Kaspersky Internet Security KLIF driver. ![]() A specially crafted native api call can cause a access violation in KLIF kernel driver resulting in local denial of service. An unprivileged user can run a program from user-mode to trigger this vulnerability.Ī denial of service vulnerability exists in the syscall filtering functionality of Kaspersky Internet Security KLIF driver. Specially crafted IOCTL requests can cause the driver to return out-of-bounds kernel memory, potentially leaking sensitive information such as privileged tokens or kernel memory addresses that may be useful in bypassing kernel mitigations. Multiple information leaks exist in various IOCTL handlers of the Kaspersky Internet Security KLDISK driver. An attacker can run a program from user-mode to trigger this vulnerability. A specially crafted IOCTL signal can cause an access violation in KL1 kernel driver resulting in local system denial of service. ![]() In Kaspersky Internet Security for Android 11., some of application exports activities have weak permissions, which might be used by a malware application to get unauthorized access to the product functionality by using Android IPC.Ī denial of service vulnerability exists in the IOCTL handling functionality of Kaspersky Internet Security KL1 driver. In Kaspersky Internet Security for Android 11., some of the application trace files were not encrypted. Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component allowed an attacker remotely disable such product's security features as private browsing and anti-banner. Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component allowed an attacker remotely disable various anti-virus protection features. ![]() Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component was vulnerable to remote disclosure of various information about the user's system (like Windows version and version of the product, host unique ID). Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component did not adequately inform the user about the threat of redirecting to an untrusted site. Possible whitelisting bypass some of the security products Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. Vulnerability has CVSS v3.0 base score 2.6 Information Disclosure in Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security versions up to 2019 could potentially disclose unique Product ID by forcing victim to visit a specially crafted webpage (for example, via clicking phishing link).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |