ID

VAR-200803-0457


CVE

CVE-2008-1471


TITLE

Panda Internet Security Such as cpoint.sys Service disruption in drivers (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-004255

DESCRIPTION

The cpoint.sys driver in Panda Internet Security 2008 and Antivirus+ Firewall 2008 allows local users to cause a denial of service (system crash or kernel panic), overwrite memory, or execute arbitrary code via a crafted IOCTL request that triggers an out-of-bounds write of kernel memory. Panda Internet Security/Antivirus+Firewall 2008 is prone to a vulnerability that allows local attackers to corrupt kernel memory. This vulnerability occurs because the application fails to sufficiently validate IOCTL requests. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Panda Products cpoint.sys Privilege Escalation Vulnerabilities SECUNIA ADVISORY ID: SA29311 VERIFY ADVISORY: http://secunia.com/advisories/29311/ CRITICAL: Less critical IMPACT: Privilege escalation, DoS WHERE: Local system SOFTWARE: Panda Internet Security 2008 http://secunia.com/product/17681/ Panda Antivirus + Firewall 2008 http://secunia.com/product/17905/ DESCRIPTION: Tobias Klein has reported some vulnerabilities in Panda products, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. Input validation errors in the cpoint.sys driver when handling certain IOCTL requests (e.g. The vulnerabilities affect the following products: * Panda Internet Security 2008 * Panda Antivirus + Firewall 2008 SOLUTION: Apply hotfix. Panda Internet Security 2008 (hfp120801s1.exe): http://www.pandasecurity.com/resources/sop/Platinum2008/hfp120801s1.exe Panda Antivirus + Firewall 2008 (hft70801s1.exe): http://www.pandasecurity.com/resources/sop/PAVF08/hft70801s1.exe PROVIDED AND/OR DISCOVERED BY: Tobias Klein ORIGINAL ADVISORY: Panda: http://www.pandasecurity.com/homeusers/support/card?id=41337&idIdioma=2&ref=ProdExp http://www.pandasecurity.com/homeusers/support/card?id=41231&idIdioma=2&ref=ProdExp http://www.trapkit.de/advisories/TKADV2008-001.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-1471 // JVNDB: JVNDB-2008-004255 // BID: 28150 // VULHUB: VHN-31596 // PACKETSTORM: 64344

AFFECTED PRODUCTS

vendor:pandamodel:internet securityscope:eqversion:2008

Trust: 1.3

vendor:pandamodel:antivirus and firewallscope:eqversion:2008

Trust: 1.0

vendor:panda securitymodel:antivirus and firewallscope:eqversion:2008

Trust: 0.8

vendor:panda securitymodel:internet securityscope:eqversion:2008

Trust: 0.8

vendor:microsoftmodel:windows-ntscope:eqversion:xp

Trust: 0.6

vendor:microsoftmodel:windows 2000scope:eqversion:pro

Trust: 0.6

vendor:microsoftmodel:windows-ntscope:eqversion:vista

Trust: 0.6

vendor:microsoftmodel:windows vistascope:eqversion:x64

Trust: 0.6

vendor:microsoftmodel:windows xpscope:eqversion:x64

Trust: 0.6

vendor:pandamodel:antivirus firewallscope:eqversion:+2008

Trust: 0.3

sources: BID: 28150 // JVNDB: JVNDB-2008-004255 // CNNVD: CNNVD-200803-380 // NVD: CVE-2008-1471

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1471
value: HIGH

Trust: 1.0

NVD: CVE-2008-1471
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200803-380
value: HIGH

Trust: 0.6

VULHUB: VHN-31596
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-1471
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31596
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-31596 // JVNDB: JVNDB-2008-004255 // CNNVD: CNNVD-200803-380 // NVD: CVE-2008-1471

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-31596 // JVNDB: JVNDB-2008-004255 // NVD: CVE-2008-1471

THREAT TYPE

local

Trust: 1.0

sources: BID: 28150 // PACKETSTORM: 64344 // CNNVD: CNNVD-200803-380

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200803-380

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-004255

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-31596

PATCH

title:20080306 41337 ENurl:http://www.pandasecurity.com/homeusers/support/card?id=41337&idIdioma=2&ref=ProdExp

Trust: 0.8

sources: JVNDB: JVNDB-2008-004255

EXTERNAL IDS

db:NVDid:CVE-2008-1471

Trust: 2.8

db:BIDid:28150

Trust: 2.0

db:SECUNIAid:29311

Trust: 1.8

db:SECTRACKid:1019568

Trust: 1.7

db:VUPENid:ADV-2008-0801

Trust: 1.7

db:JVNDBid:JVNDB-2008-004255

Trust: 0.8

db:CNNVDid:CNNVD-200803-380

Trust: 0.7

db:XFid:41079

Trust: 0.6

db:BUGTRAQid:20080308 [TKADV2008-001] PANDA INTERNET SECURITY/ANTIVIRUS+FIREWALL 2008 CPOINT.SYS KERNEL DRIVER MEMORY CORRUPTION VULNERABILITY

Trust: 0.6

db:EXPLOIT-DBid:31363

Trust: 0.1

db:VULHUBid:VHN-31596

Trust: 0.1

db:PACKETSTORMid:64344

Trust: 0.1

sources: VULHUB: VHN-31596 // BID: 28150 // JVNDB: JVNDB-2008-004255 // PACKETSTORM: 64344 // CNNVD: CNNVD-200803-380 // NVD: CVE-2008-1471

REFERENCES

url:http://www.trapkit.de/advisories/tkadv2008-001.txt

Trust: 2.1

url:http://www.pandasecurity.com/homeusers/support/card?id=41231&ididioma=2&ref=prodexp

Trust: 2.0

url:http://www.pandasecurity.com/homeusers/support/card?id=41337&ididioma=2&ref=prodexp

Trust: 2.0

url:http://www.securityfocus.com/bid/28150

Trust: 1.7

url:http://www.securitytracker.com/id?1019568

Trust: 1.7

url:http://secunia.com/advisories/29311

Trust: 1.7

url:http://www.securityfocus.com/archive/1/489292/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/0801/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41079

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1471

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1471

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/41079

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/489292/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/0801/references

Trust: 0.6

url:http://www.pandasecurity.com/homeusers/support/card?id=41231&ididioma=2&ref=prodexp

Trust: 0.1

url:http://www.pandasecurity.com/homeusers/support/card?id=41337&ididioma=2&ref=prodexp

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/17905/

Trust: 0.1

url:http://www.pandasecurity.com/resources/sop/platinum2008/hfp120801s1.exe

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://www.pandasecurity.com/resources/sop/pavf08/hft70801s1.exe

Trust: 0.1

url:http://secunia.com/product/17681/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/29311/

Trust: 0.1

sources: VULHUB: VHN-31596 // BID: 28150 // JVNDB: JVNDB-2008-004255 // PACKETSTORM: 64344 // CNNVD: CNNVD-200803-380 // NVD: CVE-2008-1471

CREDITS

Discovery is credited to Tobias Klein.

Trust: 0.9

sources: BID: 28150 // CNNVD: CNNVD-200803-380

SOURCES

db:VULHUBid:VHN-31596
db:BIDid:28150
db:JVNDBid:JVNDB-2008-004255
db:PACKETSTORMid:64344
db:CNNVDid:CNNVD-200803-380
db:NVDid:CVE-2008-1471

LAST UPDATE DATE

2024-11-23T21:56:55.552000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31596date:2018-10-11T00:00:00
db:BIDid:28150date:2015-05-07T17:32:00
db:JVNDBid:JVNDB-2008-004255date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200803-380date:2008-09-05T00:00:00
db:NVDid:CVE-2008-1471date:2024-11-21T00:44:37.097

SOURCES RELEASE DATE

db:VULHUBid:VHN-31596date:2008-03-24T00:00:00
db:BIDid:28150date:2008-03-08T00:00:00
db:JVNDBid:JVNDB-2008-004255date:2012-09-25T00:00:00
db:PACKETSTORMid:64344date:2008-03-12T17:55:23
db:CNNVDid:CNNVD-200803-380date:2008-03-24T00:00:00
db:NVDid:CVE-2008-1471date:2008-03-24T22:44:00