Vulnerabilities > CVE-2006-4926 - Local Privilege Escalation vulnerability in Kaspersky Labs Anti-Virus NDIS-TDI Hooking Engine
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Exploit-Db
description | Kaspersky Internet Security 6.0.0.303 IOCTL KLICK Local Exploit. CVE-2006-4926. Local exploit for windows platform |
id | EDB-ID:2676 |
last seen | 2016-01-31 |
modified | 2006-10-29 |
published | 2006-10-29 |
reporter | Nanika |
source | https://www.exploit-db.com/download/2676/ |
title | Kaspersky Internet Security 6.0.0.303 IOCTL KLICK Local Exploit |
Nessus
NASL family | Windows |
NASL id | KASPERSKY_KLIN_IOCTL_PRIV_ESCALATION.NASL |
description | The version of Kaspersky Anti-Virus installed on the remote host allows a local attacker to execute arbitrary code with kernel privileges by passing a specially crafted Irp structure to an IOCTL handler used by the KLIN and KLICK device drivers. By leveraging this flaw, a local attacker may be able to gain complete control of the affected system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23996 |
published | 2007-01-09 |
reporter | This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/23996 |
title | Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation |
code |
|
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425
- http://secunia.com/advisories/22478
- http://securitytracker.com/id?1017093
- http://www.kaspersky.com/technews?id=203038678
- http://www.osvdb.org/29891
- http://www.securityfocus.com/archive/1/449289/100/0/threaded
- http://www.securityfocus.com/archive/1/449301/100/0/threaded
- http://www.securityfocus.com/bid/20635
- http://www.vupen.com/english/advisories/2006/4117
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29677