Vulnerabilites related to softwin - bitdefender_antivirus
CVE-2005-1286 (GCVE-0-2005-1286)
Vulnerability from cvelistv5
Published
2005-04-26 04:00
Modified
2024-08-07 21:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unquoted Windows search path vulnerability in BitDefender 8 allows local users to prevent BitDefender from starting by creating a malicious C:\program.exe, possibly due to the lack of quoting of the full pathname when executing a process.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:44:06.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20050422 BitDefender 8 - Race condition vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111420400316397\u0026w=2" }, { "name": "15818", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/15818" }, { "name": "15076", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15076" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Unquoted Windows search path vulnerability in BitDefender 8 allows local users to prevent BitDefender from starting by creating a malicious C:\\program.exe, possibly due to the lack of quoting of the full pathname when executing a process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20050422 BitDefender 8 - Race condition vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111420400316397\u0026w=2" }, { "name": "15818", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/15818" }, { "name": "15076", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15076" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1286", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unquoted Windows search path vulnerability in BitDefender 8 allows local users to prevent BitDefender from starting by creating a malicious C:\\program.exe, possibly due to the lack of quoting of the full pathname when executing a process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20050422 BitDefender 8 - Race condition vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111420400316397\u0026w=2" }, { "name": "15818", "refsource": "OSVDB", "url": "http://www.osvdb.org/15818" }, { "name": "15076", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15076" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1286", "datePublished": "2005-04-26T04:00:00", "dateReserved": "2005-04-26T00:00:00", "dateUpdated": "2024-08-07T21:44:06.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6627 (GCVE-0-2006-6627)
Vulnerability from cvelistv5
Published
2006-12-18 11:00
Modified
2024-08-07 20:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the "cevakrnl.xmd vulnerability."
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:33:59.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21610", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21610" }, { "name": "1017389", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017389" }, { "name": "2044", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2044" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.bitdefender.com/KB323-en--cevakrnl.xmd-vulnerability.html" }, { "name": "20061215 BitDefender AV Packed PE File Parsing Engine Heap Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051319.html" }, { "name": "23415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23415" }, { "name": "20061215 BitDefender AV Packed PE File Parsing Engine Heap Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/454501/100/0/threaded" }, { "name": "ADV-2006-5040", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/5040" }, { "name": "bitdefender-pefile-bo(30904)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30904" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the \"cevakrnl.xmd vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21610", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21610" }, { "name": "1017389", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017389" }, { "name": "2044", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2044" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.bitdefender.com/KB323-en--cevakrnl.xmd-vulnerability.html" }, { "name": "20061215 BitDefender AV Packed PE File Parsing Engine Heap Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051319.html" }, { "name": "23415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23415" }, { "name": "20061215 BitDefender AV Packed PE File Parsing Engine Heap Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/454501/100/0/threaded" }, { "name": "ADV-2006-5040", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/5040" }, { "name": "bitdefender-pefile-bo(30904)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30904" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the \"cevakrnl.xmd vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21610", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21610" }, { "name": "1017389", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017389" }, { "name": "2044", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2044" }, { "name": "http://www.bitdefender.com/KB323-en--cevakrnl.xmd-vulnerability.html", "refsource": "CONFIRM", "url": "http://www.bitdefender.com/KB323-en--cevakrnl.xmd-vulnerability.html" }, { "name": "20061215 BitDefender AV Packed PE File Parsing Engine Heap Overflow", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051319.html" }, { "name": "23415", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23415" }, { "name": "20061215 BitDefender AV Packed PE File Parsing Engine Heap Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/454501/100/0/threaded" }, { "name": "ADV-2006-5040", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/5040" }, { "name": "bitdefender-pefile-bo(30904)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30904" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6627", "datePublished": "2006-12-18T11:00:00", "dateReserved": "2006-12-17T00:00:00", "dateUpdated": "2024-08-07T20:33:59.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3211 (GCVE-0-2005-3211)
Vulnerability from cvelistv5
Published
2005-10-14 04:00
Modified
2024-08-07 23:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple interpretation error in unspecified versions of BitDefender Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:59.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "name": "20051007 Antivirus detection bypass by special crafted archive.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple interpretation error in unspecified versions of BitDefender Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "name": "20051007 Antivirus detection bypass by special crafted archive.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3211", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple interpretation error in unspecified versions of BitDefender Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://shadock.net/secubox/AVCraftedArchive.html", "refsource": "MISC", "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "name": "20051007 Antivirus detection bypass by special crafted archive.", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3211", "datePublished": "2005-10-14T04:00:00", "dateReserved": "2005-10-14T00:00:00", "dateUpdated": "2024-08-07T23:01:59.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2005-10-14 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple interpretation error in unspecified versions of BitDefender Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
softwin | bitdefender_antivirus | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softwin:bitdefender_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "30643C74-5FE6-44C2-8481-AAAEF4A3374F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple interpretation error in unspecified versions of BitDefender Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper." } ], "id": "CVE-2005-3211", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-10-14T10:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://shadock.net/secubox/AVCraftedArchive.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112879611919750\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://shadock.net/secubox/AVCraftedArchive.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-18 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the "cevakrnl.xmd vulnerability."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
softwin | bitdefender | isa_server | |
softwin | bitdefender | ms_exchange_5.5 | |
softwin | bitdefender | ms_exchange_2000 | |
softwin | bitdefender | ms_exchange_2003 | |
softwin | bitdefender_antivirus | * | |
softwin | bitdefender_antivirus | plus | |
softwin | bitdefender_internet_security | * | |
softwin | bitdefender_mail_protection | enterprises | |
softwin | bitdefender_online_scanner | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softwin:bitdefender:isa_server:*:*:*:*:*:*:*", "matchCriteriaId": "4584529B-F46B-4AF0-B2E0-89678B18A72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:softwin:bitdefender:ms_exchange_5.5:*:*:*:*:*:*:*", "matchCriteriaId": "FFD84A8C-835F-48BA-8368-5B911B9E68CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:softwin:bitdefender:ms_exchange_2000:*:*:*:*:*:*:*", "matchCriteriaId": "69152DE0-192E-46CC-9010-449C0127A7BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:softwin:bitdefender:ms_exchange_2003:*:*:*:*:*:*:*", "matchCriteriaId": "153FC3E1-3DBE-4BF3-A6F9-7BB0843294E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:softwin:bitdefender_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "30643C74-5FE6-44C2-8481-AAAEF4A3374F", "vulnerable": true }, { "criteria": "cpe:2.3:a:softwin:bitdefender_antivirus:plus:*:*:*:*:*:*:*", "matchCriteriaId": "955E771C-B250-43CC-B26E-0018E4C5EC5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:softwin:bitdefender_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "A55D51C2-5E84-4133-8199-9118E9433AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:softwin:bitdefender_mail_protection:enterprises:*:*:*:*:*:*:*", "matchCriteriaId": "DBCBEF1F-E815-4E41-B28B-9E9460055F63", "vulnerable": true }, { "criteria": "cpe:2.3:a:softwin:bitdefender_online_scanner:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DA30046-674A-479E-AEFD-64E847EBE9F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the \"cevakrnl.xmd vulnerability.\"" }, { "lang": "es", "value": "Desbordamiento de enteros en el fichero de la implementaci\u00f3n del an\u00e1lisis sint\u00e1ctico del paquete PE de los productos BitDefender anteriores a la 20060829,incluyendo Antivirus, Antivirus Plus, Internet Security, Mail Protection para Enterprises y Online Scanner, y los productos BitDefender para Microsoft ISA Server y Exchange 5.5 hasta el 2003, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero modificado, que dispara un desbordamiento de b\u00fafer basado en pila, tambi\u00e9n conocido como \"vulnerabilidad cevakrnl.xmd\"." } ], "id": "CVE-2006-6627", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-18T11:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051319.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/23415" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2044" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017389" }, { "source": "cve@mitre.org", "url": "http://www.bitdefender.com/KB323-en--cevakrnl.xmd-vulnerability.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/454501/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/21610" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/5040" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30904" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051319.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/23415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.bitdefender.com/KB323-en--cevakrnl.xmd-vulnerability.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/454501/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/21610" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/5040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30904" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unquoted Windows search path vulnerability in BitDefender 8 allows local users to prevent BitDefender from starting by creating a malicious C:\program.exe, possibly due to the lack of quoting of the full pathname when executing a process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
softwin | bitdefender_antivirus | professional_plus_8 | |
softwin | bitdefender_antivirus | standard_8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softwin:bitdefender_antivirus:professional_plus_8:*:*:*:*:*:*:*", "matchCriteriaId": "9EDF3A8D-A9B7-4B8C-AC4B-FB1CDEB398B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:softwin:bitdefender_antivirus:standard_8:*:*:*:*:*:*:*", "matchCriteriaId": "B5C8950F-5C6B-4147-B976-1FD300A29D5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unquoted Windows search path vulnerability in BitDefender 8 allows local users to prevent BitDefender from starting by creating a malicious C:\\program.exe, possibly due to the lack of quoting of the full pathname when executing a process." } ], "id": "CVE-2005-1286", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=111420400316397\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/15076" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/15818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111420400316397\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/15076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/15818" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }