First published: Fri Oct 20 2006(Updated: )
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaspersky Anti-Virus | =5.0 | |
Kaspersky Anti-Virus | =5.0 | |
Kaspersky Anti-Virus | =5.0 | |
Kaspersky Internet Security 2010 | =6.0-maintenance_pack_2 | |
Kaspersky Anti-Virus | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4926 is considered to have a high severity due to the potential for local users to execute arbitrary code.
To fix CVE-2006-4926, users should apply patches provided by Kaspersky Labs for Kaspersky Anti-Virus and Kaspersky Internet Security.
CVE-2006-4926 affects Kaspersky Anti-Virus versions 5.0 and 6.0, as well as Kaspersky Internet Security version 6.0 maintenance pack 2.
CVE-2006-4926 is a local vulnerability, meaning it cannot be exploited remotely and requires local access to the system.
Users of Kaspersky Anti-Virus and Kaspersky Internet Security with the specified vulnerable versions are impacted by CVE-2006-4926.