lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 15 Jun 2007 10:15:06 +0200 From: Matousec - Transparent security Research <research@...ousec.com> To: bugtraq@...urityfocus.com Subject: Kaspersky Multiple insufficient argument validation of hooked SSDT function Vulnerability Hello, We would like to inform you about a vulnerability in Kaspersky Internet Security 6. Description: Kaspersky Internet Security hooks many functions in SSDT and in at least nine cases it fails to validate arguments that come from the user mode. User calls to NtCreateKey, NtCreateProcess, NtCreateProcessEx, NtCreateSection, NtCreateSymbolicLinkObject, NtCreateThread, NtLoadKey2, NtOpenKey, NtOpenProcess with invalid argument values can cause system crashes because of errors in KIS driver klif.sys. Further impacts of this bug (like arbitrary code execution in the kernel mode) were not examined. Note: A similar vulnerability in klif.sys driver has been published recently by an independent security researcher. In that report, the list of vulnerable functions also contains NtDeleteValueKey, NtOpenSection and NtQueryValueKey. Vulnerable software: * Kaspersky Internet Security 6.0.2.621 * Kaspersky Internet Security 6.0.2.614 * probably all older versions of Kaspersky Internet Security 6 * possibly older versions of Kaspersky Internet Security and other Kaspersky products that use klif.sys driver More details and a proof of concept including its source code are available here: http://www.matousec.com/info/advisories/Kaspersky-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php Regards, -- Matousec - Transparent security Research http://www.matousec.com/
Powered by blists - more mailing lists