First published: Fri Nov 18 2005(Updated: )
Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote attackers to execute arbitrary code via a crafted CHM file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F-Secure Anti-Virus | =4.50 | |
Kaspersky Anti-Virus | =5.0.5 | |
Kaspersky Anti-Virus | =5.0.5 | |
Kaspersky Anti-Virus | =5.0.227 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3664 has a critical severity level due to its potential for remote code execution.
To fix CVE-2005-3664, you should update Kaspersky Anti-Virus and F-Secure Anti-Virus to their latest versions.
CVE-2005-3664 affects Kaspersky Anti-Virus versions 5.0.227 and 5.0.5, as well as F-Secure Anti-Virus version 4.50.
CVE-2005-3664 exploits a heap-based buffer overflow through a crafted CHM file to execute arbitrary code.
Yes, CVE-2005-3664 can be exploited remotely, allowing attackers to execute malicious code without physical access.