Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
An active network attacker (MiTM) can achieve remote code execution on a machine that runs IKARUS Anti Virus 2.16.7. IKARUS AV for Windows uses cleartext HTTP for updates along with a CRC32 checksum and an update value for verification of the downloaded files. The attacker first forces the client to initiate an update transaction by modifying an update field within an HTTP 200 response, so that it refers to a nonexistent update. The attacker then modifies the HTTP 404 response so that it specifies a successfully found update, with a Trojan horse executable file (e.g., guardxup.exe) and the correct CRC32 checksum for that file.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
IKARUS Anti Virus for Windows 安全漏洞
Vulnerability Description
IKARUS Anti Virus for Windows是奥地利IKARUS Security Software公司的一套基于Windows平台的杀毒软件。 基于Windows平台的IKARUS Anti Virus 2.16.7版本中存在安全漏洞。远程攻击者可利用该漏洞实施中间人攻击,执行代码。
CVSS Information
N/A
Vulnerability Type
N/A