First published: Tue Jul 25 2017(Updated: )
Heap-based buffer overflow in Panda Security Kernel Memory Access Driver 1.0.0.13 allows attackers to execute arbitrary code with kernel privileges via a crafted size input for allocated kernel paged pool and allocated non-paged pool buffers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Panda Antivirus Pro | =1.0.0.13 | |
Panda Security Panda Gold Protection | =1.0.0.13 | |
Panda Security | =1.0.0.13 | |
Panda Internet Security 2015 | =1.0.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1438 is rated as high severity due to its potential for arbitrary code execution with kernel privileges.
To mitigate CVE-2015-1438, update Panda Security products to the latest version available that addresses this vulnerability.
CVE-2015-1438 affects version 1.0.0.13 of Panda Antivirus Pro, Panda Global Protection, Panda Gold Protection, and Panda Internet Security 2015.
CVE-2015-1438 is a heap-based buffer overflow vulnerability.
Yes, CVE-2015-1438 can be exploited by attackers to execute arbitrary code remotely, depending on the attack vector.