{ "id": "CVE-2018-6523", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-02T01:29:00.480", "lastModified": "2018-02-21T16:54:04.987", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In nProtect AVS V4.0 before 4.0.0.39, the driver file (TKFsAv.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x22045c." }, { "lang": "es", "value": "En nProtect AVS V4.0 en versiones anteriores a la 4.0.0.39, el archivo del controlador (TKFsAv.SYS) permite que usuarios locales provoquen una denegaci\u00f3n de servicio (BSOD) o que, posiblemente, se provoque otro impacto sin especificar debido a que no valida los valores de entrada desde IOCtl 0x22045c." } ], "vendorComments": [ { "organization": "INCA Internet", "comment": "The reported vulnerability is fixed in version 4.0.0.39 of nPrtoect AVS.
\nThe fixed version(V4.0.0.39) can be downloaded through the link below.
\nPlease download the latest version of nProtect AVS.\n

\nDownload link : http://avsd.nprotect.net/avs40/setup/nProtectSetup_AVS40.exe", "lastModified": "2018-02-21T11:54:04.987" } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "COMPLETE", "baseScore": 6.1 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, "impactScore": 8.5, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:inca:nprotect_avs:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0", "versionEndExcluding": "4.0.0.39", "matchCriteriaId": "159C43D3-E52D-424E-835C-8AB350EF5903" } ] } ] } ], "references": [ { "url": "http://inca.co.kr/include_file/pdf_down/nProtect%20AVS%20V4%20Vulnerability%20Response%20Release%20Notes.pdf", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://github.com/ZhiyuanWang-Chengdu-Qihoo360/nProtectAntivirus_POC/tree/master/TKFsAv_0x22045c", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] } ] }