Lucene search

K
cve[email protected]CVE-2014-1213
HistoryFeb 10, 2014 - 11:55 p.m.

CVE-2014-1213

2014-02-1023:55:00
CWE-264
web.nvd.nist.gov
20
cve-2014-1213
sophos
anti-virus
savi
denial of service
local users
security vulnerability

6.6 Medium

AI Score

Confidence

High

5.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:P/A:C

0.001 Low

EPSS

Percentile

24.9%

Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof “ready for update” messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-, (5) ReadyForUpdateSAV-Info, (6) SAV-, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.

6.6 Medium

AI Score

Confidence

High

5.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:P/A:C

0.001 Low

EPSS

Percentile

24.9%

Related for CVE-2014-1213