Vulnerability Details : CVE-2006-3074
klif.sys in Kaspersky Internet Security 6.0 and 7.0, Kaspersky Anti-Virus (KAV) 6.0 and 7.0, KAV 6.0 for Windows Workstations, and KAV 6.0 for Windows Servers does not validate certain parameters to the (1) NtCreateKey, (2) NtCreateProcess, (3) NtCreateProcessEx, (4) NtCreateSection, (5) NtCreateSymbolicLinkObject, (6) NtCreateThread, (7) NtDeleteValueKey, (8) NtLoadKey2, (9) NtOpenKey, (10) NtOpenProcess, (11) NtOpenSection, and (12) NtQueryValueKey hooked system calls, which allows local users to cause a denial of service (reboot) via an invalid parameter, as demonstrated by the ClientId parameter to NtOpenProcess.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2006-3074
Probability of exploitation activity in the next 30 days: 1.48%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 86 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3074
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2006-3074
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-3074
-
http://www.rootkit.com/newsread.php?newsid=726
-
http://www.securityfocus.com/bid/18341
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34875
-
http://www.vupen.com/english/advisories/2007/2145
Vendor Advisory
-
http://uninformed.org/index.cgi?v=4&a=4&p=7
-
http://www.securitytracker.com/id?1018257
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27104
-
http://www.securityfocus.com/archive/1/471453/100/0/threaded
-
http://www.vupen.com/english/advisories/2006/2333
Vendor Advisory
-
http://www.securityfocus.com/bid/24491
-
http://www.rootkit.com/board.php?did=edge726&closed=0&lastx=15
-
http://www.kaspersky.com/technews?id=203038695
-
http://www.matousec.com/info/advisories/Kaspersky-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php
-
http://uninformed.org/index.cgi?v=4&a=4&p=4
Products affected by CVE-2006-3074
- cpe:2.3:a:kaspersky:kaspersky_anti-virus:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:kaspersky:kaspersky_internet_security:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:kaspersky:kaspersky_internet_security:7.0:*:*:*:*:*:*:*