Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2009-3523

Опубликовано: 01 окт. 2009
Источник: nvd
CVSS2: 6.9
EPSS Низкий

Описание

aavmKer4.sys in avast! Home and Professional for Windows before 4.8.1356 does not properly validate input to IOCTLs (1) 0xb2d6000c and (2) 0xb2d60034, which allows local users to gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption, a different vulnerability than CVE-2008-1625.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:avast:avast_antivirus_home:*:*:windows:*:*:*:*:*
Версия до 4.8.1351 (включая)
cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.8.1169:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.8.1195:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.8.1201:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.8.1227:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.8.1229:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.8.1282:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.8.1290:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.8.1296:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_home:4.8.1335:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:*:*:windows:*:*:*:*:*
Версия до 4.8.1351 (включая)
cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.7.1098:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.8.1169:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.8.1195:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.8.1201:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.8.1227:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.8.1229:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.8.1282:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.8.1290:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.8.1296:*:windows:*:*:*:*:*
cpe:2.3:a:avast:avast_antivirus_professional:4.8.1335:*:windows:*:*:*:*:*

EPSS

Процентиль: 37%
0.00158
Низкий

6.9 Medium

CVSS2

Дефекты

CWE-20

Связанные уязвимости

github
почти 4 года назад

aavmKer4.sys in avast! Home and Professional for Windows before 4.8.1356 does not properly validate input to IOCTLs (1) 0xb2d6000c and (2) 0xb2d60034, which allows local users to gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption, a different vulnerability than CVE-2008-1625.

EPSS

Процентиль: 37%
0.00158
Низкий

6.9 Medium

CVSS2

Дефекты

CWE-20