查看: 2045|回复: 4
收起左侧

[分享] for nod32 users

[复制链接]
lanvin
发表于 2007-5-26 01:06:54 | 显示全部楼层 |阅读模式
NOD32 Antivirus Detected File Action Buffer Overflow Vulnerabilities


Description:
Ismael Briones has reported two vulnerabilities in Nod32 Antivirus, which potentially can be exploited by malicious users to gain escalated privileges, or by malicious people to compromise a vulnerable system.

The vulnerabilities are caused due to boundary errors when performing actions on a detected file (e.g. "Rename" or "Delete). These can be exploited to cause stack-based buffer overflows when performing certain actions on a detected file with an overly long, specially crafted path name.

Successful exploitation may allow execution of arbitrary code.

The vulnerabilities are reported in versions prior to 2.70.37.



Solution:
Update to version 2.70.39.
http://www.eset.com/download/registered_software.php

Provided and/or discovered by:
Ismael Briones

Changelog:
2007-05-24: Updated advisory title and description.
allenhippo
发表于 2007-5-26 05:13:24 | 显示全部楼层
铁壳这两天也发现一个溢出漏洞的
xffsfy
发表于 2007-5-26 08:01:35 | 显示全部楼层
不是早就放出39解决了么?
The EQs
发表于 2007-5-26 09:13:10 | 显示全部楼层
eset在处理bug上还是比较快的。。。。。
傻猪猪米走鸡
发表于 2007-5-26 10:04:33 | 显示全部楼层
难道要.40吗?应该是.39已修复了……
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-24 07:09 , Processed in 0.122043 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表