Vulnerabilities > CVE-2007-3675 - USE of Externally-Controlled Format String vulnerability in Kaspersky LAB Online Scanner

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
kaspersky-lab
CWE-134
critical
nessus

Summary

Multiple format string vulnerabilities in the kavwebscan.CKAVWebScan ActiveX control (kavwebscan.dll) in Kaspersky Online Scanner before 5.0.98 allow remote attackers to execute arbitrary code via format string specifiers in "various string formatting functions," which trigger heap-based buffer overflows.

Vulnerable Configurations

Part Description Count
Application
Kaspersky_Lab
1

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Format String Injection
    An attacker includes formatting characters in a string input field on the target application. Most applications assume that users will provide static text and may respond unpredictably to the presence of formatting character. For example, in certain functions of the C programming languages such as printf, the formatting character %s will print the contents of a memory location expecting this location to identify a string and the formatting character %n prints the number of DWORD written in the memory. An attacker can use this to read or write to memory locations or files, or simply to manipulate the value of the resulting text in unexpected ways. Reading or writing memory may result in program crashes and writing memory could result in the execution of arbitrary code if the attacker can write to the program stack.
  • String Format Overflow in syslog()
    This attack targets the format string vulnerabilities in the syslog() function. An attacker would typically inject malicious input in the format string parameter of the syslog function. This is a common problem, and many public vulnerabilities and associated exploits have been posted.

Nessus

NASL familyWindows
NASL idKASPERSKY_WEBSCANNER_ACTIVEX_FORMAT_STRING.NASL
descriptionThe remote host contains the Kaspersky Online Scanner, an online virus scanner for Windows. The version of the Kaspersky Web Scanner ActiveX control installed as part of this software on the remote host contains a format string vulnerability. By tricking a user on the affected host into visiting a specially crafted web page, an attacker may be able to use this method to execute arbitrary code on the affected system subject to the user
last seen2020-06-01
modified2020-06-02
plugin id26969
published2007-10-11
reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/26969
titleKaspersky Online Scanner kavwebscan.CKAVWebScan ActiveX (kavwebscan.dll) Format String Arbitrary Code Execution

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 26004 CVE(CAN) ID: CVE-2007-3675 Kaspersky Online Scanner是免费的在线病毒扫描服务,允许用户通过Web浏览器扫描恶意代码。 Kaspersky Online Scanner所带的ActiveX控件实现上存在格式串处理漏洞,远程攻击者可能利用此漏洞控制客户端系统。 Kaspersky Online Scanner所安装的以下在线病毒扫描ActiveX控件: ProgID:kavwebscan.CKAVWebScan ClassID:0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75 文件:kavwebscan.dll 将攻击者所提供的数据传输为各种格式串函数的参数以便显示HTML页面中的本地化信息。如果使用这个ActiveX控件渲染了特制页面的话,就可能触发堆溢出,导致执行任意指令。 Kaspersky Labs Online Scanner 5.0.93.1 Kaspersky Labs Online Scanner 5.0.93.0 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href="http://www.kaspersky.com/" target="_blank">http://www.kaspersky.com/</a>
idSSV:2288
last seen2017-11-19
modified2007-10-12
published2007-10-12
reporterRoot
titleKaspersky Online Scanner kavwebscan.dll控件远程格式串漏洞