|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> avast! Antivirus Server Edition LHA Archive Handling Buffer Overflow Vulnerability Vulnerability Assessment Details
|
avast! Antivirus Server Edition LHA Archive Handling Buffer Overflow Vulnerability |
||
Checks version of avast Server Edition Detailed Explanation for this Vulnerability Assessment Summary : The remote Windows host contains an application that is affected by a buffer overflow. Description : The remote host is running avast! Antivirus Server Edition. The installed version of avast! Antivirus Server Edition is reportedly prone to a heap overflow when processing LHA archives with long filename and directory-name extended-header fields. A possible hacker may be able to exploit this issue to execute arbitrary code on the remote host, likely with LOCAL SYSTEM rights. See also : http://www.hustlelabs.com/advisories/04072006_alwil.pdf http://www.avast.com/eng/avast-4-server-revision-history.html Solution : Upgrade to avast! Antivirus Server Edition 4.7.660 or later. Network Security Threat Level: High / CVSS Base Score : 7.0 (AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N) Networks Security ID: 19903 Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |