Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.811552
Categoría:General
Título:Quick Heal Internet Security Multiple Vulnerabilities
Resumen:Quick Heal Internet Security is prone to multiple vulnerabilities.
Descripción:Summary:
Quick Heal Internet Security is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to:

- The PE files in the default installation do not use ASLR/DEP protection
mechanisms that provide sufficient defense against directed attacks against
the product.

- A Memory Corruption error while parsing a malformed Mach-O file.

- An Out of Bounds Write on a Heap Buffer due to improper validation of
dwCompressionSize of Microsoft WIM Header WIMHEADER_V1_PACKED.

- A Memory Corruption error while parsing a malformed Mach-O file.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to gain Remote Code Execution as well as Privilege Escalation.

Affected Software/OS:
Quick Heal Internet Security 10.1.0.316
and prior.

Solution:
The vendor has released multiple security patches to fix tihe vulnerabilities.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-8773
http://payatu.com/oob-write-heap-buffer-dwcompressionsize-ms-wim/
Common Vulnerability Exposure (CVE) ID: CVE-2017-8774
http://payatu.com/quick-heal-internet-security-memory-corruption-vulnerability/
Common Vulnerability Exposure (CVE) ID: CVE-2017-8775
http://payatu.com/quick-heal-internet-security-memory-corruption-vulnerability-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-8776
http://payatu.com/quick-heal-antivirus-protection-mechanism-failure-vulnerability/
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.