First published: Wed Apr 02 2008(Updated: )
aavmker4.sys in avast! Home and Professional 4.7 for Windows does not properly validate input to IOCTL 0xb2d60030, which allows local users to gain privileges via certain IOCTL requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avast Antivirus | =4.7.827 | |
Avast Antivirus | =4.7.844 | |
Avast Antivirus | =4.7.869 | |
Avast Antivirus | =4.7.1043 | |
Avast Antivirus | =4.7.1098 | |
Avast Pro Antivirus | =4.7.827 | |
Avast Pro Antivirus | =4.7.844 | |
Avast Pro Antivirus | =4.7.1043 | |
Avast Pro Antivirus | =4.7.1098 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1625 is considered to have a high severity level due to its potential to allow local users to gain elevated privileges.
To fix CVE-2008-1625, you should update the affected versions of Avast Antivirus Home and Professional to the latest release provided by Avast.
CVE-2008-1625 affects specific versions of Avast Antivirus Home and Professional including 4.7.827, 4.7.844, 4.7.869, 4.7.1043, and 4.7.1098.
CVE-2008-1625 requires local access to the system to be exploited, making it a local privilege escalation vulnerability.
CVE-2008-1625 affects the aavmker4.sys driver within the Avast software, specifically through improper input validation in IOCTL 0xb2d60030.