Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> NOD32 Antivirus Local File Creation Vulnerability


Vulnerability Assessment Details

NOD32 Antivirus Local File Creation Vulnerability

Vulnerability Assessment Summary
Checks version number of NOD32

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote Windows host contains an application that is subject to a
local privilege escalation attack.

Description :

The installed version of NOD32 reportedly permits a local user to
restore a malicious file from NOD32's quarantine to an arbitrary
directory to which the user otherwise has only read access. A local
user can exploit this issue to gain admin/system privilege on the
affected host.

See also :

http://www.securityfocus.com/archive/1/429892/30/0/threaded

Solution :

Upgrade to NOD32 version 2.51.26 or later.

Network Security Threat Level:

High / CVSS Base Score : 7.0
(AV:L/AC:L/Au:NR/C:C/I:C/A:C/B:N)

Networks Security ID: 17374

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

NEW SonicWALL 01-SSC-0431 TZ500 Network Security/Firewall Appliance Wrles AC
$2170.98
NEW SonicWALL 01-SSC-0431 TZ500 Network Security/Firewall Appliance Wrles AC pictureCisco ASA5512-IPS-K9 ASA 5512-X Security Appliance Firewall w/ IPS Services
$1300.0
Cisco ASA5512-IPS-K9 ASA 5512-X Security Appliance Firewall w/ IPS Services  pictureCheck Point UTM-1 Edge N - Firewall Security
$45.0
Check Point UTM-1 Edge N - Firewall Security picturei Sight Firewall
$24.99
i Sight Firewall picture


Discussions

No Discussions have been posted on this vulnerability.