CVE-2009-4215

Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:32_bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:32-bit:*:*:*:*:*
OR cpe:2.3:a:pandasecurity:panda_antivirus:2010:*:pro:*:*:*:*:*
cpe:2.3:a:pandasecurity:panda_global_protection:2010:*:*:*:*:*:*:*
cpe:2.3:a:pandasecurity:panda_internet_security:2010:*:pro:*:*:*:*:*

History

21 Nov 2024, 01:09

Type Values Removed Values Added
References () http://secunia.com/advisories/37373 - Vendor Advisory () http://secunia.com/advisories/37373 - Vendor Advisory
References () http://www.pandasecurity.com/homeusers/support/card?id=80164&idIdioma=2 - Patch, Vendor Advisory () http://www.pandasecurity.com/homeusers/support/card?id=80164&idIdioma=2 - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/507811/100/0/threaded - () http://www.securityfocus.com/archive/1/507811/100/0/threaded -
References () http://www.securitytracker.com/id?1023121 - () http://www.securitytracker.com/id?1023121 -
References () http://www.vupen.com/english/advisories/2009/3126 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/3126 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54268 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54268 -

Information

Published : 2009-12-07 17:30

Updated : 2024-11-21 01:09


NVD link : CVE-2009-4215

Mitre link : CVE-2009-4215

CVE.ORG link : CVE-2009-4215


JSON object : View

Products Affected

pandasecurity

  • panda_antivirus
  • panda_global_protection
  • panda_internet_security

microsoft

  • windows_vista
  • windows_7
  • windows_xp
CWE
CWE-264

Permissions, Privileges, and Access Controls