Vulnerability Name: | CVE-2010-3499 (CCN-62626) | ||||||||
Assigned: | 2010-06-10 | ||||||||
Published: | 2010-06-10 | ||||||||
Updated: | 2012-08-22 | ||||||||
Summary: | F-Secure Anti-Virus does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution. Note: the researcher indicates that a vendor response was received, stating that "the inability to catch these files are caused by lacking functionality rather than programming errors." | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P/E:POC/RL:OF/RC:C)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: MITRE Type: CNA CVE-2010-3499 Source: CCN Type: F-Secure Web site F-Secure Source: CCN Type: n00bz.net Antivirus detection after malware execution Source: MISC Type: UNKNOWN http://www.n00bz.net/antivirus-cve Source: CCN Type: OSVDB ID: 75188 F-Secure Protocol Handler (HCP) Malicious Code Execution Antivirus Scan Bypass Source: BUGTRAQ Type: UNKNOWN 20101018 Antivirus detection after malware execution Source: XF Type: UNKNOWN fsecure-hcp-security-bypass(62626) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |