[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Kaspersky 2010 Remote Memory Corruption / DoS PoC

Author
Prakhar Prasad
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6983
Category
dos / poc
Date add
27-08-2009
Platform
unsorted
=================================================
Kaspersky 2010 Remote Memory Corruption / DoS PoC
=================================================


Description
============

The vulnerability affects Kaspersky Internet Security 2010 9.0.0.459
antivirus and its brother, the Kaspersky Antivirus 2010 9.0.0.463
version. The exploit was discovered on August 18th 2009. The problem
with these two antivirus versions appears when parsing a URL address.
Using a lot of consecutive dots inside the address.Kaspersky's native
avp.exe process will soar CPU usage up to 100%. At first, traffic via
the browser will get blocked, and eventually, if enough consecutive dots
have been passed inside the URL address, the computer will crash. This
exploit can be used inside HTML files, as normal href values or as img
image sources. It will also work inside HTML email bodies. The code can
be used remotely, and will lead to a Remote Memory
Corruption/Denial-of-Service that could alter computer hardware or
software.

Tested on Products
=================
Kaspersky Internet Security 2010 9.0.0.459 (EN) with Mozilla FireFox in Windows XP Professional SP2 [en-US]
Kaspersky Anti-Virus 2010 [En] with IE8 in Windows XP Professional SP2 [en-US]

I have not tested it in Windows Vista/7 but it will work fine.

Exploit: http://inj3ct0r.com/sploits/6983.zip


#  0day.today [2024-12-24]  #