CVE-2006-3074

klif.sys in Kaspersky Internet Security 6.0 and 7.0, Kaspersky Anti-Virus (KAV) 6.0 and 7.0, KAV 6.0 for Windows Workstations, and KAV 6.0 for Windows Servers does not validate certain parameters to the (1) NtCreateKey, (2) NtCreateProcess, (3) NtCreateProcessEx, (4) NtCreateSection, (5) NtCreateSymbolicLinkObject, (6) NtCreateThread, (7) NtDeleteValueKey, (8) NtLoadKey2, (9) NtOpenKey, (10) NtOpenProcess, (11) NtOpenSection, and (12) NtQueryValueKey hooked system calls, which allows local users to cause a denial of service (reboot) via an invalid parameter, as demonstrated by the ClientId parameter to NtOpenProcess.
References
Link Resource
http://secunia.com/advisories/20629 Vendor Advisory
http://secunia.com/advisories/25603 Vendor Advisory
http://uninformed.org/index.cgi?v=4&a=4&p=4
http://uninformed.org/index.cgi?v=4&a=4&p=7
http://www.kaspersky.com/technews?id=203038695
http://www.matousec.com/info/advisories/Kaspersky-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php
http://www.rootkit.com/board.php?did=edge726&closed=0&lastx=15
http://www.rootkit.com/newsread.php?newsid=726
http://www.securityfocus.com/archive/1/471453/100/0/threaded
http://www.securityfocus.com/bid/18341
http://www.securityfocus.com/bid/24491
http://www.securitytracker.com/id?1018257
http://www.vupen.com/english/advisories/2006/2333 Vendor Advisory
http://www.vupen.com/english/advisories/2007/2145 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/27104
https://exchange.xforce.ibmcloud.com/vulnerabilities/34875
http://secunia.com/advisories/20629 Vendor Advisory
http://secunia.com/advisories/25603 Vendor Advisory
http://uninformed.org/index.cgi?v=4&a=4&p=4
http://uninformed.org/index.cgi?v=4&a=4&p=7
http://www.kaspersky.com/technews?id=203038695
http://www.matousec.com/info/advisories/Kaspersky-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php
http://www.rootkit.com/board.php?did=edge726&closed=0&lastx=15
http://www.rootkit.com/newsread.php?newsid=726
http://www.securityfocus.com/archive/1/471453/100/0/threaded
http://www.securityfocus.com/bid/18341
http://www.securityfocus.com/bid/24491
http://www.securitytracker.com/id?1018257
http://www.vupen.com/english/advisories/2006/2333 Vendor Advisory
http://www.vupen.com/english/advisories/2007/2145 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/27104
https://exchange.xforce.ibmcloud.com/vulnerabilities/34875
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kaspersky:kaspersky_anti-virus:6.0:*:*:*:*:*:*:*
cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0:*:*:*:*:*:*:*
cpe:2.3:a:kaspersky:kaspersky_internet_security:6.0:*:*:*:*:*:*:*
cpe:2.3:a:kaspersky:kaspersky_internet_security:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:kaspersky:kaspersky_anti-virus:6.0:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://secunia.com/advisories/20629 - Vendor Advisory () http://secunia.com/advisories/20629 - Vendor Advisory
References () http://secunia.com/advisories/25603 - Vendor Advisory () http://secunia.com/advisories/25603 - Vendor Advisory
References () http://uninformed.org/index.cgi?v=4&a=4&p=4 - () http://uninformed.org/index.cgi?v=4&a=4&p=4 -
References () http://uninformed.org/index.cgi?v=4&a=4&p=7 - () http://uninformed.org/index.cgi?v=4&a=4&p=7 -
References () http://www.kaspersky.com/technews?id=203038695 - () http://www.kaspersky.com/technews?id=203038695 -
References () http://www.matousec.com/info/advisories/Kaspersky-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php - () http://www.matousec.com/info/advisories/Kaspersky-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php -
References () http://www.rootkit.com/board.php?did=edge726&closed=0&lastx=15 - () http://www.rootkit.com/board.php?did=edge726&closed=0&lastx=15 -
References () http://www.rootkit.com/newsread.php?newsid=726 - () http://www.rootkit.com/newsread.php?newsid=726 -
References () http://www.securityfocus.com/archive/1/471453/100/0/threaded - () http://www.securityfocus.com/archive/1/471453/100/0/threaded -
References () http://www.securityfocus.com/bid/18341 - () http://www.securityfocus.com/bid/18341 -
References () http://www.securityfocus.com/bid/24491 - () http://www.securityfocus.com/bid/24491 -
References () http://www.securitytracker.com/id?1018257 - () http://www.securitytracker.com/id?1018257 -
References () http://www.vupen.com/english/advisories/2006/2333 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2333 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2007/2145 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/2145 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27104 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27104 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/34875 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/34875 -

Information

Published : 2006-06-19 10:02

Updated : 2024-11-21 00:12


NVD link : CVE-2006-3074

Mitre link : CVE-2006-3074

CVE.ORG link : CVE-2006-3074


JSON object : View

Products Affected

microsoft

  • windows
  • windows_server

kaspersky

  • kaspersky_anti-virus
  • kaspersky_internet_security
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer