Posted by Virus Bulletin on Apr 5, 2007
ActiveX and overflow issues allowed remote data theft, local system attacks.
Several vulnerabilities have been revealed in many Kaspersky security products, including ActiveX flaws which could expose data, allowing files to be accessed or stolen by remote malicious attackers, and other flaws which could allow malicious local users to bypass security, escalate local privileges and cause denial of service from the product.
The ActiveX flaws, caused by the use of insecure methods in the ActiveX implementation within the product, could allow sites carrying an exploit to access local files, and to transfer them via anonymous FTP. Exploitation would require the user to visit such a maliciously designed site.
The other vulnerabilities, involving heap overflows in several components including the 'anti-hacker' protection provided by some products and resulting memory corruption, could be used to gain privileged system access and to disable protection. These flaws could only be exploited by a local user.
The flaws, which affect several versions of Kaspersky Anti-Virus as well as Kaspersky Internet Security, were variously discovered by iDefense, Tipping Point's Zero Day Initiative, and Kaspersky themselves. All have now been patched in the latest updates to the affected products, and users are advised to ensure they are running the latest versions of all software.
Details from Kaspersky are here and here, and alerts from iDefense are here and here. A further advisory from Secunia, marked 'highly critical', is here.
Posted on 05 April 2007 by Virus Bulletin