First published: Fri Apr 06 2007(Updated: )
Heap-based buffer overflow in the arj.ppl module in the OnDemand Scanner in Kaspersky Anti-Virus, Anti-Virus for Workstations, and Anti-Virus for File Servers 6.0, and Internet Security 6.0 before Maintenance Pack 2 build 6.0.2.614 allows remote attackers to execute arbitrary code via crafted ARJ archives.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaspersky Anti-Virus | =6.0 | |
Kaspersky Anti-Virus | =6.0 | |
Kaspersky Anti-Virus | =6.0 | |
Kaspersky Internet Security 2010 | <=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0445 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2007-0445, update Kaspersky Anti-Virus and Internet Security to Maintenance Pack 2 build 6.0.2.614 or higher.
CVE-2007-0445 affects Kaspersky Anti-Virus and Internet Security versions 6.0 prior to Maintenance Pack 2.
CVE-2007-0445 can be exploited by remote attackers who craft specifically designed ARJ archives.
The impact of CVE-2007-0445 includes the execution of arbitrary code on the affected systems, leading to potential system compromise.