CVE-2013-6767

Stack-based buffer overflow in pepoly.dll in Quick Heal AntiVirus Pro 7.0.0.1 allows local users to execute arbitrary code or cause a denial of service (process crash) via a long *.text value in a PE file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:quickheal:antivirus_pro:7.0.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:59

Type Values Removed Values Added
References () http://osvdb.org/101130 - () http://osvdb.org/101130 -
References () http://packetstormsecurity.com/files/124477/QuickHeal-AntiVirus-7.0.0.1-Stack-Buffer-Overflow.html - Exploit () http://packetstormsecurity.com/files/124477/QuickHeal-AntiVirus-7.0.0.1-Stack-Buffer-Overflow.html - Exploit
References () http://seclists.org/bugtraq/2013/Dec/90 - () http://seclists.org/bugtraq/2013/Dec/90 -
References () http://www.exploit-db.com/exploits/30374 - () http://www.exploit-db.com/exploits/30374 -
References () http://www.securityfocus.com/bid/64402 - Exploit () http://www.securityfocus.com/bid/64402 - Exploit
References () http://www.vulnerability-lab.com/get_content.php?id=1171 - Exploit () http://www.vulnerability-lab.com/get_content.php?id=1171 - Exploit

Information

Published : 2013-12-20 22:55

Updated : 2024-11-21 01:59


NVD link : CVE-2013-6767

Mitre link : CVE-2013-6767

CVE.ORG link : CVE-2013-6767


JSON object : View

Products Affected

quickheal

  • antivirus_pro
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer