[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-3074

Date: (C)2006-06-19   (M)2017-07-21
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











klif.sys in Kaspersky Internet Security 6.0 and 7.0, Kaspersky Anti-Virus (KAV) 6.0 and 7.0, KAV 6.0 for Windows Workstations, and KAV 6.0 for Windows Servers does not validate certain parameters to the (1) NtCreateKey, (2) NtCreateProcess, (3) NtCreateProcessEx, (4) NtCreateSection, (5) NtCreateSymbolicLinkObject, (6) NtCreateThread, (7) NtDeleteValueKey, (8) NtLoadKey2, (9) NtOpenKey, (10) NtOpenProcess, (11) NtOpenSection, and (12) NtQueryValueKey hooked system calls, which allows local users to cause a denial of service (reboot) via an invalid parameter, as demonstrated by the ClientId parameter to NtOpenProcess.

Reference:
SECTRACK-1018257
BID-18341
http://www.securityfocus.com/archive/1/archive/1/471453/100/0/threaded
SECUNIA-20629
BID-24491
SECUNIA-25603
ADV-2006-2333
ADV-2007-2145
http://uninformed.org/index.cgi?v=4&a=4&p=4
http://uninformed.org/index.cgi?v=4&a=4&p=7
http://www.kaspersky.com/technews?id=203038695
http://www.matousec.com/info/advisories/Kaspersky-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php
http://www.rootkit.com/board.php?did=edge726&closed=0&lastx=15
http://www.rootkit.com/newsread.php?newsid=726
kaspersky-klif-dos(27104)
kaspersky-multiple-klif-dos(34875)

CWE    1
CWE-119

© 2013 SecPod Technologies