Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
German Cybersecurity Agency Warns of Security Flaw in Kaspersky Antivirus
#1
https://news.softpedia.com/news/german-c...5998.shtml    

Quote:German Cybersecurity Agency Warns of Security Flaw in Kaspersky Antivirus
Official patch already available since mid-April
May 13, 2019 09:37 GMT  ·  By Bogdan Popa  ·          
Kaspersky has already released a patch in April

German cybersecurity agency BSI issued a warning concerning a security flaw in Kaspersky antivirus, recommending users to install the latest patches as soon as possible.

While the advisory (available in German here, so translation is needed) doesn’t include any details regarding possible cyberattacks based on the flaw, BSI warns that hackers only need to send a malicious email containing a crafted file to their targets and, in some cases, this file “doesn’t even need to be opened.”

The security flaw that BSI warns of is documented in CVE-2019-8285, and it was actually fixed by Kaspersky last month.

The issue allows for remote execution of arbitrary code on a vulnerable computer, and Kaspersky said only systems with antivirus databases released before April 4 were exposed.
"Patch already available for Kaspersky software"

The patch has already been released through the built-in update system of Kaspersky products, so if automatic updates are enabled, your device should be secure.

“Kaspersky Lab has fixed a security issue CVE-2019-8285 in its products that could potentially allow third-parties to remotely execute arbitrary code on a user's PC with system privileges. The security fix was deployed to Kaspersky Lab customers on 4th April, 2019 through a product update,” an advisory published by Kaspersky on May 8 reads.

Technically, all Kaspersky products with antivirus database are affected by the vulnerability. The vulnerability isn’t tied to the operating system version, so all Windows releases are impacted.

“This issue was classified as heap-based buffer overflow vulnerability. Memory corruption during JS file scan could lead to execution of arbitrary code on a user machine,” Kaspersky says.

In other words, the vulnerability can be exploited by simply having the Kaspersky security product to scan a crafted JS file, which can help an attacker achieve remote code execution and eventually take control of the target device.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  (Kaspersky) What is Cloud Security? Cloud security definition mrtrout 0 491 01-24-2024 , 06:04 AM
Last Post: mrtrout
  VMware warns of critical vRealize flaw exploited in attacks mrtrout 0 381 06-21-2023 , 02:00 AM
Last Post: mrtrout
  5 Cybersecurity Trends to Watch in 2022 ( Kaspersky ) mrtrout 0 1,007 01-02-2022 , 12:16 PM
Last Post: mrtrout
  According to Kaspersky Security Network, in Q3 2021 mrtrout 0 525 12-13-2021 , 04:31 AM
Last Post: mrtrout
  'Russian Hackers' Again Target German MPs: Report Bjyda 0 1,397 03-27-2021 , 11:15 PM
Last Post: Bjyda

Forum Jump:


Users browsing this thread: 1 Guest(s)