First published: Mon Jan 02 2017(Updated: )
Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earlier, Total Security 10.1.0.316 and earlier, and AntiVirus Pro 10.1.0.316 and earlier on OS X allows remote attackers to execute arbitrary code via a crafted LC_UNIXTHREAD.cmdsize field in a Mach-O file that is mishandled during a Security Scan (aka Custom Scan) operation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QuickHeal Antivirus Pro | <=10.1.0.316 | |
Quickheal Internet Security | <=10.1.0.316 | |
Quickheal Total Security | <=10.1.0.316 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5005 has a high severity level due to its potential for remote code execution.
To fix CVE-2017-5005, update Quick Heal products to versions later than 10.1.0.316.
CVE-2017-5005 affects Quick Heal Internet Security, Total Security, and AntiVirus Pro versions 10.1.0.316 and earlier.
Yes, CVE-2017-5005 can be exploited remotely by attackers through crafted Mach-O files.
There are no known effective workarounds for CVE-2017-5005, so updating to the latest version is recommended.