| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.9 | $0-$5k | 0.00 |
Summary
A vulnerability identified as problematic has been detected in Kaspersky Anti-Virus 6.0/7.0. This issue affects some unknown processing of the file klif.sys. Performing a manipulation results in memory corruption. This vulnerability is reported as CVE-2006-3074. Moreover, an exploit is present. The affected component should be disabled.
Details
A vulnerability, which was classified as problematic, was found in Kaspersky Anti-Virus 6.0/7.0 (Anti-Malware Software). This affects some unknown functionality of the file klif.sys. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on availability. The summary by CVE is:
klif.sys in Kaspersky Internet Security 6.0 and 7.0, Kaspersky Anti-Virus (KAV) 6.0 and 7.0, KAV 6.0 for Windows Workstations, and KAV 6.0 for Windows Servers does not validate certain parameters to the (1) NtCreateKey, (2) NtCreateProcess, (3) NtCreateProcessEx, (4) NtCreateSection, (5) NtCreateSymbolicLinkObject, (6) NtCreateThread, (7) NtDeleteValueKey, (8) NtLoadKey2, (9) NtOpenKey, (10) NtOpenProcess, (11) NtOpenSection, and (12) NtQueryValueKey hooked system calls, which allows local users to cause a denial of service (reboot) via an invalid parameter, as demonstrated by the ClientId parameter to NtOpenProcess.
The weakness was disclosed 06/12/2007 by EP_X0FF (Website). The advisory is shared at rootkit.com. This vulnerability is uniquely identified as CVE-2006-3074 since 06/19/2006. The attack can only be initiated within the local network. No form of authentication is needed for exploitation. Technical details and a public exploit are known.
The exploit is shared for download at securityfocus.com. It is declared as proof-of-concept.
The best possible mitigation is suggested to be disabling the affected component.
The vulnerability is also documented in the databases at X-Force (34875), SecurityFocus (BID 24491†), OSVDB (41173†), Secunia (SA25603†) and SecurityTracker (ID 1018257†). The entry VDB-2320 is pretty similar. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.kaspersky.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 5.9
VulDB Base Score: 6.5
VulDB Temp Score: 5.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: DisableStatus: 🔍
0-Day Time: 🔍
Timeline
06/14/2006 🔍06/19/2006 🔍
06/19/2006 🔍
06/12/2007 🔍
06/12/2007 🔍
06/15/2007 🔍
06/15/2007 🔍
06/18/2007 🔍
04/23/2018 🔍
Sources
Vendor: kaspersky.comAdvisory: rootkit.com
Researcher: EP_X0FF
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2006-3074 (🔍)
GCVE (CVE): GCVE-0-2006-3074
GCVE (VulDB): GCVE-100-3117
X-Force: 34875 - Kaspersky Anti-Virus multiple klif.sys denial of service, Medium Risk
SecurityFocus: 24491 - Kaspersky Internet Security 6 SSDT Hooks Multiple Local Vulnerabilities
Secunia: 25603 - Kaspersky Anti-Virus klif.sys Hooked Functions Denial of Service, Not Critical
OSVDB: 41173 - Kaspersky Anti-Virus klif.sys Multiple Hooked System Calls Local DoS
SecurityTracker: 1018257
Vupen: ADV-2007-2145
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 06/18/2007 19:38Updated: 04/23/2018 09:23
Changes: 06/18/2007 19:38 (72), 04/23/2018 09:23 (8)
Complete: 🔍
Cache ID: 216::103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.

No comments yet. Languages: en.
Please log in to comment.