The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/449289/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29677 | vdb entry |
http://www.osvdb.org/29891 | patch vdb entry exploit |
http://www.securityfocus.com/archive/1/449301/100/0/threaded | mailing list |
http://www.kaspersky.com/technews?id=203038678 | patch |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425 | patch vendor advisory third party advisory |
http://secunia.com/advisories/22478 | patch vendor advisory third party advisory |
http://www.securityfocus.com/bid/20635 | patch vdb entry exploit |
http://securitytracker.com/id?1017093 | patch vdb entry exploit |
http://www.vupen.com/english/advisories/2006/4117 | vdb entry |