Vulnerabilities > F Secure > F Secure Anti Virus > High

DATE CVE VULNERABILITY TITLE RISK
2009-02-06 CVE-2008-6085 Numeric Errors vulnerability in F-Secure products
Integer overflow in multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, and others, when configured to scan inside compressed archives, allows remote attackers to execute arbitrary code via a crafted RPM compressed archive file, which triggers a buffer overflow.
network
high complexity
f-secure CWE-189
7.6
2008-02-22 CVE-2008-0910 Permissions, Privileges, and Access Controls vulnerability in F-Secure products
Multiple F-Secure anti-virus products, including Internet Security 2006 through 2008, Anti-Virus 2006 through 2008, F-Secure Protection Service, and others, allow remote attackers to bypass malware detection via a crafted RAR archive.
network
low complexity
f-secure CWE-264
7.5
2007-05-31 CVE-2007-2966 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in F-Secure products
Buffer overflow in the LHA decompression component in F-Secure anti-virus products for Microsoft Windows and Linux before 20070529 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted LHA archive, related to an integer wrap, a similar issue to CVE-2006-4335.
network
low complexity
f-secure CWE-119
7.5
2007-05-31 CVE-2007-2965 Local Security vulnerability in Internet Gatekeeper
Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and "access validation of the address space."
local
low complexity
f-secure
7.2
2007-03-21 CVE-2007-1557 Local Format String vulnerability in F-Secure Anti-Virus 6.02
Format string vulnerability in F-Secure Anti-Virus Client Security 6.02 allows local users to cause a denial of service and possibly gain privileges via format string specifiers in the Management Server name field on the Communication settings page.
local
low complexity
f-secure
7.2
2006-06-06 CVE-2006-2838 Denial-Of-Service vulnerability in F-Secure Anti-Virus and Internet Gatekeeper
Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors.
network
high complexity
f-secure
7.6
2006-01-21 CVE-2006-0337 Archive Handling vulnerability in F-Secure
Buffer overflow in multiple F-Secure Anti-Virus products and versions for Windows and Linux, including Anti-Virus for Windows Servers 5.52 and earlier, Internet Security 2004, 2005 and 2006, and Anti-Virus for Linux Servers 4.64 and earlier, allows remote attackers to execute arbitrary code via crafted ZIP archives.
network
low complexity
f-secure
7.5
2005-11-18 CVE-2005-3664 Remote Buffer Overflow vulnerability in Kaspersky Anti-Virus Engine CHM File Parser
Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file.
network
low complexity
f-secure kaspersky-lab
7.5
2005-11-16 CVE-2005-3546 Local Privilege Escalation vulnerability in F-Secure Anti-Virus and Internet Gatekeeper
suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege.
local
low complexity
f-secure
7.2
2005-05-02 CVE-2005-0350 Remote Security vulnerability in F-Secure Anti-Virus
Heap-based buffer overflow in multiple F-Secure Anti-Virus and Internet Security products allows remote attackers to execute arbitrary code via a crafted ARJ archive.
network
low complexity
f-secure
7.5