Vulnerabilities > CVE-2008-1471 - Resource Management Errors vulnerability in Panda products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The cpoint.sys driver in Panda Internet Security 2008 and Antivirus+ Firewall 2008 allows local users to cause a denial of service (system crash or kernel panic), overwrite memory, or execute arbitrary code via a crafted IOCTL request that triggers an out-of-bounds write of kernel memory.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 5 | |
Application | 2 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | Panda Internet Security/Antivirus+Firewall 2008 CPoint.sys Memory Corruption Vulnerability. CVE-2008-1471 . Dos exploit for windows platform |
id | EDB-ID:31363 |
last seen | 2016-02-03 |
modified | 2008-03-08 |
published | 2008-03-08 |
reporter | Tobias Klein |
source | https://www.exploit-db.com/download/31363/ |
title | Panda Internet Security/Antivirus+Firewall 2008 - CPoint.sys Memory Corruption Vulnerability |
Nessus
NASL family | Windows |
NASL id | PANDA_AV_FW_CPOINT_SYS_KERNEL_MEM_CORRUPT.NASL |
description | A vulnerability in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 31462 |
published | 2008-03-13 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/31462 |
title | Panda Security cpoint.sys Kernel Memory Corruption |
code |
|
References
- http://secunia.com/advisories/29311
- http://secunia.com/advisories/29311
- http://www.pandasecurity.com/homeusers/support/card?id=41231&idIdioma=2&ref=ProdExp
- http://www.pandasecurity.com/homeusers/support/card?id=41231&idIdioma=2&ref=ProdExp
- http://www.pandasecurity.com/homeusers/support/card?id=41337&idIdioma=2&ref=ProdExp
- http://www.pandasecurity.com/homeusers/support/card?id=41337&idIdioma=2&ref=ProdExp
- http://www.securityfocus.com/archive/1/489292/100/0/threaded
- http://www.securityfocus.com/archive/1/489292/100/0/threaded
- http://www.securityfocus.com/bid/28150
- http://www.securityfocus.com/bid/28150
- http://www.securitytracker.com/id?1019568
- http://www.securitytracker.com/id?1019568
- http://www.trapkit.de/advisories/TKADV2008-001.txt
- http://www.trapkit.de/advisories/TKADV2008-001.txt
- http://www.vupen.com/english/advisories/2008/0801/references
- http://www.vupen.com/english/advisories/2008/0801/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41079
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41079