First published: Mon Jun 19 2006(Updated: )
klif.sys in Kaspersky Internet Security 6.0 and 7.0, Kaspersky Anti-Virus (KAV) 6.0 and 7.0, KAV 6.0 for Windows Workstations, and KAV 6.0 for Windows Servers does not validate certain parameters to the (1) NtCreateKey, (2) NtCreateProcess, (3) NtCreateProcessEx, (4) NtCreateSection, (5) NtCreateSymbolicLinkObject, (6) NtCreateThread, (7) NtDeleteValueKey, (8) NtLoadKey2, (9) NtOpenKey, (10) NtOpenProcess, (11) NtOpenSection, and (12) NtQueryValueKey hooked system calls, which allows local users to cause a denial of service (reboot) via an invalid parameter, as demonstrated by the ClientId parameter to NtOpenProcess.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaspersky Anti-Virus | =7.0 | |
Kaspersky Internet Security 2010 | =7.0 | |
Kaspersky Internet Security 2010 | =6.0 | |
Kaspersky Anti-Virus | =6.0 | |
Microsoft Windows | ||
Microsoft Windows Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3074 is rated as a high-severity vulnerability due to its potential to allow unauthorized access or control over the affected Kaspersky software.
To fix CVE-2006-3074, it is recommended to update to the latest version of Kaspersky Anti-Virus or Kaspersky Internet Security that addresses this vulnerability.
CVE-2006-3074 affects Kaspersky Anti-Virus 6.0 and 7.0, as well as Kaspersky Internet Security 6.0 and 7.0.
CVE-2006-3074 can potentially be exploited through local privilege escalation, allowing attackers to gain unauthorized control over the affected systems.
Yes, if you are using Kaspersky Anti-Virus or Internet Security version 6.0 or 7.0, your system is at risk due to CVE-2006-3074 and should be updated immediately.