Avira AntiVir up to 7.0 build 151 update.exe PBM_GETRANGE Remote Code Execution
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.0 | $0-$5k | 0.11 |
Summary
A vulnerability was found in Avira AntiVir up to 7.0 build 151. It has been declared as problematic. This issue affects some unknown processing of the file update.exe. Executing a manipulation of the argument PBM_GETRANGE can lead to Remote Code Execution. This vulnerability is tracked as CVE-2006-4619. No exploit exists. It is recommended to upgrade the affected component.
Details
A vulnerability classified as critical was found in Avira AntiVir up to 7.0 build 151. This vulnerability affects some unknown processing of the file update.exe. The manipulation of the argument PBM_GETRANGE with an unknown input leads to a remote code execution vulnerability. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
The start update window in update.exe in Avira AntiVir PersonalEdition Classic 7.0 build 151 allows local users to gain system privileges via a "Shatter" style attack on the (1) IParam parameter, and the (2) PBM_GETRANGE and (3) PBM_SETRANGE messages in an unspecified progress bar. NOTE: some details are obtained from third party information.
The weakness was disclosed 09/07/2006 by rugginello as not defined posting (Bugtraq). The advisory is shared for download at securityfocus.com. This vulnerability was named CVE-2006-4619 since 09/06/2006. Access to the local network is required for this attack to succeed. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available.
Upgrading eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at free-av.de. The best possible mitigation is suggested to be upgrading to the latest version.
The vulnerability is also documented in the databases at SecurityFocus (BID 19889†), OSVDB (28586†) and Secunia (SA21764†). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 6.0
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Patch: free-av.de
Timeline
09/06/2006 🔍09/06/2006 🔍
09/07/2006 🔍
09/07/2006 🔍
09/07/2006 🔍
09/07/2006 🔍
09/08/2006 🔍
04/22/2018 🔍
Sources
Advisory: securityfocus.com⛔Researcher: rugginello
Status: Not defined
CVE: CVE-2006-4619 (🔍)
GCVE (CVE): GCVE-0-2006-4619
GCVE (VulDB): GCVE-100-2512
SecurityFocus: 19889
Secunia: 21764 - AntiVir PersonalEdition "update.exe" Privilege Escalation, Less Critical
OSVDB: 28586 - AntiVir PersonalEdition update.exe IParam Parameter Arbitrary Code Execution
Entry
Created: 09/08/2006 10:47Updated: 04/22/2018 12:59
Changes: 09/08/2006 10:47 (60), 04/22/2018 12:59 (7)
Complete: 🔍
Cache ID: 216:89E:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.