CVE-2014-9632
Summary
| CVE | CVE-2014-9632 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-02-06 15:59:00 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | The TDI driver (avgtdix.sys) in AVG Internet Security before 2013.3495 Hot Fix 18 and 2015.x before 2015.5315 and Protection before 2015.5315 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x830020f8 IOCTL call. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Avg | Internet Security | All | All | All | All |
| Application | Avg | Protection | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| AVG Internet Security 2015.0.5315 Privilege Escalation ≈ Packet Storm | af854a3a-2127-422b-91ae-364da2661108 | packetstormsecurity.com | Exploit, Third Party Advisory |
| AVG Antivirus & Security Software - AVG Release Notes | af854a3a-2127-422b-91ae-364da2661108 | www.avg.com | Vendor Advisory |
| AVG Internet Security 2015 Arbitrary Write Privilege Escalation | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | Exploit, Third Party Advisory |
| Analysis Of An Interesting Windows Kernel Change Mitigating Vulnerabilities In Some Security Products | GreyHatHacker.NET | af854a3a-2127-422b-91ae-364da2661108 | www.greyhathacker.net | Third Party Advisory |
| www.osvdb.org/113824 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | Broken Link |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.