lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20090824120901.6127.qmail@securityfocus.com>
Date: 24 Aug 2009 12:09:01 -0000
From: s.leberre@...dream.com
To: bugtraq@...urityfocus.com
Subject: Local Kernel Buffer Overflow vulnerability in Avast!

//----- Advisory

Program          : avast! 4.8.1335 Professional
Homepage         : http://www.avast.com
Discovery        : 2009/07/29
Author Contacted : 2009/07/31
Found by         : Heurs
This Advisory    : Heurs
Contact          : heurs@...stsinthstack.org, s.leberre@...dream.com


//----- Application description

Avast! antivirus software represents complete virus protection,
offering full desktop security including a resident shield.
This antivirus is certified by both ICSA Labs and West Coast
Labs Checkmark.

//----- Description of vulnerability

The File System Filter driver is prone to a local kernel buffer overflow.
This vulnerability allows an intruder to gain SYSTEM privileges on a Windows
system from a limited user account.


//----- Proof Of Concept

http://www.sysdream.com/LocalEscalation_Avast.rar

//----- Credits

http://www.sysdream.com
http://ghostsinthestack.org

s.leberre at sysdream dot com

heurs at ghostsinthestack dot org

//----- Greetings

Virtualabs

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ