ID

VAR-200511-0109


CVE

CVE-2005-3664


TITLE

Kaspersky Antivirus engine CHM File parser remote overflow vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200511-258

DESCRIPTION

Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file. On Microsoft platforms, the affected software cannot execute arbitrary code, but prevents Kaspersky Anti-Virus from scanning any files, thus potentially allowing later malicious code to reach its target. For more information: SA17130 The vulnerability has been reported in version 4.50. Prior versions may also be affected. TITLE: Kaspersky Anti-Virus Engine CHM File Parsing Buffer Overflow SECUNIA ADVISORY ID: SA17130 VERIFY ADVISORY: http://secunia.com/advisories/17130/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Kaspersky Anti-Virus 5.x http://secunia.com/product/2781/ DESCRIPTION: A vulnerability has been reported in Kaspersky Anti-Virus, which can be exploited by malicious people to cause a DoS (Denial of Service), or compromise a vulnerable system. The vulnerability is caused due to a boundary error in the scan engine when parsing a malformed CHM file. This can be exploited to cause a heap-based buffer overflow when a specially crafted CHM file is scanned. On Windows platforms, the anti-virus may fail to scan any other files after a malformed CHM file has been encountered. SOLUTION: The vulnerability has reportedly been fixed via a signature update after July 2005. PROVIDED AND/OR DISCOVERED BY: Discovered by anonymous person and reported via iDEFENSE. ORIGINAL ADVISORY: iDEFENSE: http://www.idefense.com/application/poi/display?id=318&type=vulnerabilities ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.17

sources: NVD: CVE-2005-3664 // VULHUB: VHN-14872 // PACKETSTORM: 40601 // PACKETSTORM: 40600

AFFECTED PRODUCTS

vendor:kaspersky labmodel:anti-virus personalscope:eqversion:5.0.227

Trust: 1.6

vendor:kaspersky labmodel:anti-virusscope:eqversion:5.0.5

Trust: 1.6

vendor:f securemodel:f-secure anti-virusscope:eqversion:4.50

Trust: 1.0

sources: CNNVD: CNNVD-200511-258 // NVD: CVE-2005-3664

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3664
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200511-258
value: HIGH

Trust: 0.6

VULHUB: VHN-14872
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-3664
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14872
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14872 // CNNVD: CNNVD-200511-258 // NVD: CVE-2005-3664

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-3664

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200511-258

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200511-258

EXTERNAL IDS

db:SECUNIAid:17130

Trust: 1.8

db:SECUNIAid:17144

Trust: 1.8

db:OSVDBid:19912

Trust: 1.7

db:OSVDBid:19913

Trust: 1.7

db:NVDid:CVE-2005-3664

Trust: 1.7

db:BIDid:15054

Trust: 1.7

db:CNNVDid:CNNVD-200511-258

Trust: 0.7

db:IDEFENSEid:20051010 KASPERSKY ANTI-VIRUS ENGINE CHM FILE PARSER BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:XFid:22564

Trust: 0.6

db:VULHUBid:VHN-14872

Trust: 0.1

db:PACKETSTORMid:40601

Trust: 0.1

db:PACKETSTORMid:40600

Trust: 0.1

sources: VULHUB: VHN-14872 // PACKETSTORM: 40601 // PACKETSTORM: 40600 // CNNVD: CNNVD-200511-258 // NVD: CVE-2005-3664

REFERENCES

url:http://www.idefense.com/application/poi/display?id=318&type=vulnerabilities

Trust: 1.8

url:http://www.securityfocus.com/bid/15054

Trust: 1.7

url:http://www.osvdb.org/19912

Trust: 1.7

url:http://www.osvdb.org/19913

Trust: 1.7

url:http://secunia.com/advisories/17130

Trust: 1.7

url:http://secunia.com/advisories/17144

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/22564

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/22564

Trust: 0.6

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/advisories/17130/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://www.idefense.com/application/poi/display?id=318&type=vulnerabilities

Trust: 0.1

url:http://secunia.com/product/3165/

Trust: 0.1

url:http://secunia.com/advisories/17144/

Trust: 0.1

url:http://secunia.com/product/2781/

Trust: 0.1

sources: VULHUB: VHN-14872 // PACKETSTORM: 40601 // PACKETSTORM: 40600 // CNNVD: CNNVD-200511-258 // NVD: CVE-2005-3664

CREDITS

iDEFENSE

Trust: 0.6

sources: CNNVD: CNNVD-200511-258

SOURCES

db:VULHUBid:VHN-14872
db:PACKETSTORMid:40601
db:PACKETSTORMid:40600
db:CNNVDid:CNNVD-200511-258
db:NVDid:CVE-2005-3664

LAST UPDATE DATE

2024-08-14T12:41:39.333000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14872date:2017-07-11T00:00:00
db:CNNVDid:CNNVD-200511-258date:2006-03-08T00:00:00
db:NVDid:CVE-2005-3664date:2017-07-11T01:33:16.503

SOURCES RELEASE DATE

db:VULHUBid:VHN-14872date:2005-11-18T00:00:00
db:PACKETSTORMid:40601date:2005-10-11T23:51:24
db:PACKETSTORMid:40600date:2005-10-11T23:51:24
db:CNNVDid:CNNVD-200511-258date:2005-10-11T00:00:00
db:NVDid:CVE-2005-3664date:2005-11-18T06:04:00