Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-3074

CWE-119Buffer Overflow4 documents4 sources
Severity
5.0MEDIUM
EPSS
4.1%
top 11.48%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 19
Latest updateMay 1

Description

klif.sys in Kaspersky Internet Security 6.0 and 7.0, Kaspersky Anti-Virus (KAV) 6.0 and 7.0, KAV 6.0 for Windows Workstations, and KAV 6.0 for Windows Servers does not validate certain parameters to the (1) NtCreateKey, (2) NtCreateProcess, (3) NtCreateProcessEx, (4) NtCreateSection, (5) NtCreateSymbolicLinkObject, (6) NtCreateThread, (7) NtDeleteValueKey, (8) NtLoadKey2, (9) NtOpenKey, (10) NtOpenProcess, (11) NtOpenSection, and (12) NtQueryValueKey hooked system calls, which allows local users

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-w86f-98cr-v2wp: klif2022-05-01
CVEList
CVE-2006-3074: klif2006-06-19

💥Exploits & PoCs

1
Exploit-DB
Kaspersky Internet Security 6.0 - SSDT Hooks Multiple Local Vulnerabilities2007-06-15
CVE-2006-3074 (MEDIUM CVSS 5) | klif.sys in Kaspersky Internet Secu | cvebase.io