F-Secure Anti-Virus for Windows Servers 7.0 64-bit edition allows local users to bypass virus scanning by using the system32 directory to store a crafted (1) archive or (2) packed executable. NOTE: in many environments, this does not cross privilege boundaries because any process able to write to system32 could also shut off F-Secure Anti-Virus.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/41377 - | |
References | () http://secunia.com/advisories/26948 - Patch, Vendor Advisory | |
References | () http://www.f-secure.com/security/fsc-2007-6.shtml - Patch | |
References | () http://www.securityfocus.com/bid/25824 - | |
References | () http://www.securitytracker.com/id?1018745 - | |
References | () http://www.vupen.com/english/advisories/2007/3277 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36833 - |
Information
Published : 2007-10-01 05:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5143
Mitre link : CVE-2007-5143
CVE.ORG link : CVE-2007-5143
JSON object : View
Products Affected
f-secure
- f-secure_anti-virus
microsoft
- windows_2003_server
CWE