|
|
|
|
| |
Credit:
The information has been provided by iDefense Labs Security Advisories.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=704
|
| |
Vulnerable Systems:
* Kasperky Lab's Internet Security version 7.0.1.325
The kl1.sys kernel driver distributed with Internet Security contains a stack-based buffer overflow in the handling of IOCTL 0x800520e8. This issue is caused by a failure to properly perform bounds checks on user-supplied data that is passed to the swprintf function as a source buffer. The destination buffer in this case is a 2,000 element wide-character array. If the source buffer exceeds 2,000 characters, a buffer overflow will occur leading to the execution of arbitrary code.
Analysis:
Exploitation of this issue allows an attacker to execute arbitrary code within the kernel. An attacker would need local access to a vulnerable computer to exploit this vulnerability.
Vendor response:
Kaspersky Lab has addressed this vulnerability by releasing updated anti-virus definition databases. For more information, refer the their article at the following URL.
http://www.kaspersky.com/technews?id=203038727
CVE Information:
CVE-2008-1518
Disclosure Timeline:
03/19/2008 - Initial vendor notification
03/20/2008 - Initial vendor response
06/04/2008 - Coordinated public disclosure
|
|
|
|
|