Lucene search

K
symantecSymantec Security ResponseSMNTC-111033
HistoryDec 02, 2019 - 12:00 a.m.

Multiple Kaspersky Products CVE-2019-15689 DLL Loading Arbitrary Code Execution Vulnerability

2019-12-0200:00:00
Symantec Security Response
www.symantec.com
13

0.001 Low

EPSS

Percentile

35.9%

Description

Multiple Kaspersky Products are prone to an arbitrary code-execution vulnerability. An attacker can leverage this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial of service condition. The following products are affected: Versions prior to Kaspersky Secure Connection 4.0 (2020) patch E Versions prior to Kaspersky Internet Security 2020 patch E Versions prior to Kaspersky Total Security 2020 patch E Versions prior to Kaspersky Security Cloud 2020 patch E

Technologies Affected

  • Kaspersky Lab Kaspersky Internet Security 2019
  • Kaspersky Lab Kaspersky Internet Security 2019 Patch F
  • Kaspersky Lab Kaspersky Internet Security 2019 Patch I
  • Kaspersky Lab Kaspersky Internet Security 2019 Patch J
  • Kaspersky Lab Kaspersky Internet Security 2020
  • Kaspersky Lab Kaspersky Security Cloud 2019
  • Kaspersky Lab Kaspersky Security Cloud 2019 Patch I
  • Kaspersky Lab Kaspersky Security Cloud 2019 Patch J
  • Kaspersky Lab Kaspersky Security Cloud 2020
  • Kaspersky Lab Kaspersky Total Security 2019
  • Kaspersky Lab Kaspersky Total Security 2019 Patch F
  • Kaspersky Lab Kaspersky Total Security 2019 Patch I
  • Kaspersky Lab Kaspersky Total Security 2019 Patch J
  • Kaspersky Lab Kaspersky Total Security 2020
  • Kaspersky Secure Connection 3.0
  • Kaspersky Secure Connection 4.0

Recommendations

Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Allow only trusted individuals to have user accounts and local access to the resources.

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.

Do not accept or execute files from untrusted or unknown sources.
Exercise caution when handling files received from unfamiliar or suspicious sources.

Implement multiple redundant layers of security.
Use of multiple redundant layers of encryption may reduce exposure to this and other latent vulnerabilities.

Updates are available. Please see the references for more information.

0.001 Low

EPSS

Percentile

35.9%