In Watchdog Anti-Malware 2.74.186.150 and Online Security Pro 2.74.186.150, the zam32.sys driver contains a NULL pointer dereference vulnerability that gets triggered when sending an operation to ioctl 0x80002054. This is due to the input buffer being NULL or the input buffer size being 0 as they are not validated.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/43058/ | issue tracking exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/144786/Watchdog-Development-Anti-Malware-Online-Security-Pro-NULL-Pointer-Dereference.html | issue tracking exploit vdb entry third party advisory |