Описание
AVG Internet Security 2015 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.
AVG Internet Security 2015 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-8578
- http://blog.ensilo.com/the-av-vulnerability-that-bypasses-mitigations
- http://breakingmalware.com/vulnerabilities/sedating-watchdog-abusing-security-products-bypass-mitigations
- http://breakingmalware.com/vulnerabilities/vulnerability-patching-learning-from-avg-on-doing-it-right
- http://www.securityfocus.com/bid/78813
EPSS
CVE ID
Связанные уязвимости
AVG Internet Security 2015 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.
Уязвимость антивирусного программного средства AVG InternetSecurity, позволяющая нарушителю обойти механизм защиты DEP и ASLR
EPSS