Vulnerability Name: | CCN-176412 | ||||||
Published: | 2020-02-17 | ||||||
Updated: | 2020-02-17 | ||||||
Summary: | Multiple Kaspersyk Antivirus products could allow a remote attacker to bypass security restrictions, caused by improper ZIP compression information field validation by the scan engine. By persuading a victim to open a specially-crafted ZIP archive file (File Name length Field), an attacker could exploit this vulnerability to bypass the antivirus scan. | ||||||
CVSS v3 Severity: | 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) 4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:C/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: XF Type: UNKNOWN kaspersky-zipnamelength02-sec-bypass(176412) Source: CCN Type: BugTraq Mailing List, Mon, 17 Feb 2020 11:11:38 +0100 [TZO-17-2020] - Kaspersky Generic Archive Bypass (ZIP FLNMLEN) Source: CCN Type: Full-Disclosure Mailing List, Mon, 17 Feb 2020 11:11:38 +0100 [TZO-17-2020] - Kaspersky Generic Archive Bypass (ZIP FLNMLEN) Source: CCN Type: Kaspersyky Web site Kaspersky Antivirus products | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |