Multiple format string vulnerabilities in the kavwebscan.CKAVWebScan ActiveX control (kavwebscan.dll) in Kaspersky Online Scanner before 5.0.98 allow remote attackers to execute arbitrary code via format string specifiers in "various string formatting functions," which trigger heap-based buffer overflows.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.kaspersky.com/news?id=207575572 | patch |
http://securitytracker.com/id?1018800 | vdb entry patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37057 | vdb entry |
http://secunia.com/advisories/27187 | third party advisory patch vendor advisory |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=606 | third party advisory |
http://www.securityfocus.com/bid/26004 | vdb entry patch |
http://www.vupen.com/english/advisories/2007/3455 | vdb entry |