Vulnerabilities > CVE-2007-5143 - Unspecified vulnerability in F-Secure Anti-Virus 7.00
Attack vector
LOCAL Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
F-Secure Anti-Virus for Windows Servers 7.0 64-bit edition allows local users to bypass virus scanning by using the system32 directory to store a crafted (1) archive or (2) packed executable. NOTE: in many environments, this does not cross privilege boundaries because any process able to write to system32 could also shut off F-Secure Anti-Virus.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Application | 1 |
Nessus
NASL family | Windows |
NASL id | FSECURE_FSC2007_6.NASL |
description | The remote host is running F-Secure Anti-Virus for Windows Servers. According to its version, the installation of this software on the remote host may allow an attacker by bypass antivirus scanning by placing a specially crafted archive or packed executable into the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 26193 |
published | 2007-09-28 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/26193 |
title | F-Secure Anti-Virus for Windows system32 Directory Crafted File Detection Bypass |