Vulnerability Name:

CVE-2006-4926 (CCN-29677)

Assigned:2006-10-20
Published:2006-10-20
Updated:2018-10-17
Summary:The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2006-4926

Source: IDEFENSE
Type: Patch, Vendor Advisory
20061020 Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation Vulnerability

Source: CCN
Type: SA22478
Kaspersky Labs Anti-Virus IOCTL Privilege Escalation

Source: SECUNIA
Type: Patch, Vendor Advisory
22478

Source: CCN
Type: SECTRACK ID: 1017093
Kaspersky Anti-Virus Lets Local Users Gain Elevated Privileges

Source: SECTRACK
Type: Exploit, Patch
1017093

Source: CCN
Type: Kaspersky Lab Web site
Kaspersky Antivirus Software Products for Home Computer Security

Source: CONFIRM
Type: Patch
http://www.kaspersky.com/technews?id=203038678

Source: OSVDB
Type: Exploit, Patch
29891

Source: CCN
Type: OSVDB ID: 29891
Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation

Source: BUGTRAQ
Type: UNKNOWN
20061020 [Reversemode Advisory] Kaspersky Anti-Virus Privilege Escalation

Source: BUGTRAQ
Type: UNKNOWN
20061020 Re: iDefense Security Advisory 10.19.06: Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation Vulnerability

Source: BID
Type: Exploit, Patch
20635

Source: CCN
Type: BID-20635
Kaspersky Labs Anti-Virus NDIS-TDI Hooking Engine Local Privilege Escalation Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2006-4117

Source: XF
Type: UNKNOWN
kaspersky-klinklick-privilege-escalation(29677)

Source: XF
Type: UNKNOWN
kaspersky-klinklick-privilege-escalation(29677)

Source: CCN
Type: iDefense Security Advisory 10.19.06
Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:kaspersky_lab:kaspersky_anti-virus:5.0:*:windows_workstations:*:*:*:*:*
  • OR cpe:/a:kaspersky_lab:kaspersky_anti-virus:6.0:*:workstations:*:*:*:*:*
  • OR cpe:/a:kaspersky_lab:kaspersky_anti-virus_personal:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:kaspersky_lab:kaspersky_anti-virus_personal_pro:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:kaspersky_lab:kaspersky_internet_security:6.0:maintenance_pack_2:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    kaspersky_lab kaspersky anti-virus 5.0
    kaspersky_lab kaspersky anti-virus 6.0
    kaspersky_lab kaspersky anti-virus personal 5.0
    kaspersky_lab kaspersky anti-virus personal pro 5.0
    kaspersky_lab kaspersky internet security 6.0 maintenance_pack_2