Lucene search

K
nvd[email protected]NVD:CVE-2014-1213
HistoryFeb 10, 2014 - 11:55 p.m.

CVE-2014-1213

2014-02-1023:55:05
CWE-264
web.nvd.nist.gov
1

CVSS2

5.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:P/A:C

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

26.3%

Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof “ready for update” messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-, (5) ReadyForUpdateSAV-Info, (6) SAV-, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.

Affected configurations

Nvd
Node
sophosscanning_engineRange3.48
OR
sophossophos_anti-virusMatch10.0.11

CVSS2

5.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:P/A:C

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

26.3%

Related for NVD:CVE-2014-1213