{"id": "OPENVAS:1361412562310800242", "type": "openvas", "bulletinFamily": "scanner", "title": "Kaspersky AntiVirus Buffer Overflow Vulnerability", "description": "This host is running Kaspersky AntiVirus or Workstation and is\n prone to Buffer Overflow Vulnerability.", "published": "2009-02-16T00:00:00", "modified": "2019-03-19T00:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800242", "reporter": "Copyright (C) 2009 Greenbone Networks GmbH", "references": ["http://www.kaspersky.com/productupdates?chapter=146274385", "http://www.wintercore.com/advisories/advisory_W020209.html", "http://secunia.com/advisories/33788"], "cvelist": ["CVE-2009-0449"], "lastseen": "2019-05-29T18:40:18", "viewCount": 5, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-0449"]}, {"type": "openvas", "idList": ["OPENVAS:800242"]}], "rev": 4}, "score": {"value": 0.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2009-0449"]}, {"type": "openvas", "idList": ["OPENVAS:800242"]}]}, "exploitation": null, "vulnersScore": 0.3}, "pluginID": "1361412562310800242", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_kaspersky_av_bof_vuln.nasl 14330 2019-03-19 13:59:11Z asteins $\n#\n# Kaspersky AntiVirus Buffer Overflow Vulnerability\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800242\");\n script_version(\"$Revision: 14330 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 14:59:11 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-16 16:42:20 +0100 (Mon, 16 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_bugtraq_id(33561);\n script_cve_id(\"CVE-2009-0449\");\n script_name(\"Kaspersky AntiVirus Buffer Overflow Vulnerability\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/33788\");\n script_xref(name:\"URL\", value:\"http://www.wintercore.com/advisories/advisory_W020209.html\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"gb_kaspersky_av_detect.nasl\");\n script_mandatory_keys(\"Kaspersky/products/installed\");\n script_tag(name:\"affected\", value:\"Kaspersky AntiVirus version 7.0.1.325 and prior on Windows.\n Kaspersky AntiVirus Workstation version 6.0.3.837 and prior on Windows.\");\n script_tag(name:\"insight\", value:\"This flaw is due to an error in the klim5.sys driver when handling Kernel\n API calls IOCTL 0x80052110 which can overwrite callback function pointers\n and execute arbitrary codes into the context of the application.\");\n script_tag(name:\"solution\", value:\"No known solution was made available for at least one year since the disclosure\n of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer\n release, disable respective features, remove the product or replace the product by another one.\");\n script_tag(name:\"summary\", value:\"This host is running Kaspersky AntiVirus or Workstation and is\n prone to Buffer Overflow Vulnerability.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will let the attacker execute arbitrary codes in the\n context of the application or may cause privilege escalation.\");\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n script_xref(name:\"URL\", value:\"http://www.kaspersky.com/productupdates?chapter=146274385\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nkavVer = get_kb_item(\"Kaspersky/AV/Ver\");\nif(kavVer != NULL)\n{\n if(version_is_less_equal(version:kavVer, test_version:\"7.0.1.325\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n\nkavwVer = get_kb_item(\"Kaspersky/AV-Workstation/Ver\");\nif(kavwVer != NULL)\n{\n if(version_is_less_equal(version:kavwVer, test_version:\"6.0.3.837\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n}\n", "naslFamily": "Buffer overflow", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645457466, "score": 1659797217}, "_internal": {"score_hash": "8f36a7641321ed22005ddbaa4a767609"}}
{"cve": [{"lastseen": "2022-03-23T21:16:29", "description": "Buffer overflow in klim5.sys in Kaspersky Anti-Virus for Workstations 6.0 and Anti-Virus 2008 allows local users to gain privileges via an IOCTL 0x80052110 call.", "cvss3": {}, "published": "2009-02-10T07:00:00", "type": "cve", "title": "CVE-2009-0449", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-0449"], "modified": "2018-10-11T21:01:00", "cpe": ["cpe:/a:kaspersky_lab:kaspersky_anti-virus:2008", "cpe:/a:kaspersky_lab:kaspersky_anti-virus:6.0"], "id": "CVE-2009-0449", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0449", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:6.0:*:workstations:*:*:*:*:*", "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:2008:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-19T10:55:11", "description": "This host is running Kaspersky AntiVirus or Workstation and is\n prone to Buffer Overflow Vulnerability.", "cvss3": {}, "published": "2009-02-16T00:00:00", "type": "openvas", "title": "Kaspersky AntiVirus Buffer Overflow Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-0449"], "modified": "2017-07-04T00:00:00", "id": "OPENVAS:800242", "href": "http://plugins.openvas.org/nasl.php?oid=800242", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_kaspersky_av_bof_vuln.nasl 6516 2017-07-04 12:20:47Z cfischer $\n#\n# Kaspersky AntiVirus Buffer Overflow Vulnerability\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let the attacker execute arbitrary codes in the\n context of the application or may cause privilege escalation.\n\n Impact level: Application/System\";\n\ntag_affected = \"Kaspersky AntiVirus version 7.0.1.325 and prior on Windows.\n Kaspersky AntiVirus Workstation version 6.0.3.837 and prior on Windows.\";\ntag_insight = \"This flaw is due to an error in the klim5.sys driver when handling Kernel\n API calls IOCTL 0x80052110 which can overwrite callback function pointers\n and execute arbitrary codes into the context of the application.\";\ntag_solution = \"No solution or patch was made available for at least one year since disclosure\n of this vulnerability. Likely none will be provided anymore. General solution\n options are to upgrade to a newer release, disable respective features,\n remove the product or replace the product by another one.\n For updates refer to http://www.kaspersky.com/productupdates?chapter=146274385\";\ntag_summary = \"This host is running Kaspersky AntiVirus or Workstation and is\n prone to Buffer Overflow Vulnerability.\";\n\nif(description)\n{\n script_id(800242);\n script_version(\"$Revision: 6516 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-04 14:20:47 +0200 (Tue, 04 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-16 16:42:20 +0100 (Mon, 16 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_bugtraq_id(33561);\n script_cve_id(\"CVE-2009-0449\");\n script_name(\"Kaspersky AntiVirus Buffer Overflow Vulnerability\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/33788\");\n script_xref(name : \"URL\" , value : \"http://www.wintercore.com/advisories/advisory_W020209.html\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"gb_kaspersky_av_detect.nasl\");\n script_mandatory_keys(\"Kaspersky/products/installed\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nkavVer = get_kb_item(\"Kaspersky/AV/Ver\");\nif(kavVer != NULL)\n{\n if(version_is_less_equal(version:kavVer, test_version:\"7.0.1.325\")){\n security_message(0);\n exit(0);\n }\n}\n\nkavwVer = get_kb_item(\"Kaspersky/AV-Workstation/Ver\");\nif(kavwVer != NULL)\n{\n if(version_is_less_equal(version:kavwVer, test_version:\"6.0.3.837\")){\n security_message(0);\n }\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}