First published: Thu Mar 17 2022(Updated: )
The kernel mode driver kwatch3 of KINGSOFT Internet Security 9 Plus Version 2010.06.23.247 fails to properly handle crafted inputs, leading to stack-based buffer overflow.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
KINGSOFT Internet Security 9 Plus | =2010.06.23.247 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the kernel mode driver kwatch3 of KINGSOFT Internet Security 9 Plus Version 2010.06.23.247 is CVE-2022-25949.
The severity of CVE-2022-25949 is high, with a severity value of 7.8.
The affected software for CVE-2022-25949 is KINGSOFT Internet Security 9 Plus Version 2010.06.23.247.
CVE-2022-25949 is a vulnerability in the kernel mode driver kwatch3 of KINGSOFT Internet Security 9 Plus Version 2010.06.23.247 that fails to properly handle crafted inputs, leading to a stack-based buffer overflow.
Yes, there are references related to CVE-2022-25949. You can find more information at the following links: [https://jvn.jp/en/jp/JVN21234459/](https://jvn.jp/en/jp/JVN21234459/) and [https://support.kingsoft.jp/support-info/weakness.html](https://support.kingsoft.jp/support-info/weakness.html).