CVE-2007-5086
Summary
| CVE | CVE-2007-5086 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-09-26 10:17:00 UTC |
| Updated | 2011-03-08 03:00:00 UTC |
| Description | Kaspersky Anti-Virus (KAV) and Internet Security 7.0 build 125 do not properly validate certain parameters to System Service Descriptor Table (SSDT) and Shadow SSDT function handlers, which allows local users to cause a denial of service (crash) via the (1) NtUserSendInput, (2) LoadLibraryA, (3) NtOpenProcess, (4) NtOpenThread, (5) NtTerminateProcess, (6) NtUserFindWindowEx, and (7) NtUserBuildHwndList kernel SSDT hooks in kylif.sys; the (8) NtDuplicateObject (DuplicateHandle) kernel SSDT hook; and possibly other kernel SSDT hooks. NOTE: the NtCreateSection vector is covered by CVE-2007-5043.1. NOTE: the vendor disputes that the DuplicateHandle vector is a vulnerability in their code, stating that "it is not an error in our code, but an obscure method for manipulating standard Windows routines to circumvent our self-defense mechanisms." |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Kaspersky Lab | Kaspersky Anti-virus | All | All | All | All |
| Application | Kaspersky Lab | Kaspersky Anti-virus | All | All | All | All |
| Application | Kaspersky Lab | Kaspersky Internet Security | 7.0_build125 | All | All | All |
| Application | Kaspersky Lab | Kaspersky Internet Security | 7.0_build125 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Faulty data processing in klif.sys driver | CONFIRM | www.kaspersky.com | |
| www.rootkit.com/newsread.php | MISC | www.rootkit.com | Exploit |
| 37990 | OSVDB | osvdb.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Kaspersky AntiVirus klif.sys Hooked Functions Denial of Service - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.