Multiple format string vulnerabilities in the kavwebscan.CKAVWebScan ActiveX control (kavwebscan.dll) in Kaspersky Online Scanner before 5.0.98 allow remote attackers to execute arbitrary code via format string specifiers in "various string formatting functions," which trigger heap-based buffer overflows.
References
Configurations
History
21 Nov 2024, 00:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=606 - | |
References | () http://secunia.com/advisories/27187 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1018800 - Patch | |
References | () http://www.kaspersky.com/news?id=207575572 - Patch | |
References | () http://www.securityfocus.com/bid/26004 - Patch | |
References | () http://www.vupen.com/english/advisories/2007/3455 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37057 - |
Information
Published : 2007-10-12 20:17
Updated : 2024-11-21 00:33
NVD link : CVE-2007-3675
Mitre link : CVE-2007-3675
CVE.ORG link : CVE-2007-3675
JSON object : View
Products Affected
kaspersky_lab
- online_scanner
CWE
CWE-134
Use of Externally-Controlled Format String