![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800720 |
Categoría: | Privilege escalation |
Título: | ArcaVir AntiVirus Products Privilege Escalation Vulnerability |
Resumen: | ArcaVir AntiVirus Products is prone to a privilege escalation vulnerability. |
Descripción: | Summary: ArcaVir AntiVirus Products is prone to a privilege escalation vulnerability. Vulnerability Insight: This flaw is due to vulnerability in ps_drv.sys driver, which allows any users to open the device '\\Device\\ps_drv' and issue IOCTLs with a buffering mode of METHOD_NEITHER. Vulnerability Impact: Successful exploitation will let the attacker pass kernel addresses as the arguments to the driver and overwrite an arbitrary address in the kernel space through a specially crafted IOCTL. Affected Software/OS: ArcaBit 2009 Home Protection prior to 9.4.3204.9 ArcaVir 2009 System Protection prior to 9.4.3203.9 ArcaVir 2009 Internet Security prior to 9.4.3202.9 ArcaBit ArcaVir 2009 Antivirus Protection prior to 9.4.3201.9 Solution: Apply the security updates accordingly. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1824 BugTraq ID: 35100 http://www.securityfocus.com/bid/35100 https://www.exploit-db.com/exploits/8782 http://ntinternals.org/ntiadv0814/PsDrv_Exp.zip http://ntinternals.org/ntiadv0814/ntiadv0814.html http://secunia.com/advisories/35260 http://www.vupen.com/english/advisories/2009/1428 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |