CVE-2017-5005 for Quick Heal AntivirusQuickHeal
=========
CVE-2017-5005 for Quick Heal Antivirus
Advisory
--------
**Improper Restriction of Operations** within the **Bounds of a Memory Buffer** vulnerability.
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Vulnerability Description
-------------------------
We found that the **Quick Heal Internet Security** is vulnerable to **Out of Bound Write on Stack Buffer** due to improper validation of `LC_UNIXTHREAD.cmdsize` (**Mach-O**).
This vulnerability can be exploited to gain **Remote Code Execution** as well as **Privilege Escalation**.
Proof of Concept
----------------
[](https://www.youtube.com/watch?v=h9LOsv4XE00)
Vendor
------
[http://www.quickheal.co.in/](http://www.quickheal.co.in/)
Products
--------
* Quick Heal Internet Security 10.1.0.316 and prior
* Quick Heal Total Security 10.1.0.316 and prior
* Quick Heal AntiVirus Pro 10.1.0.316 and prior
Disclosure Timeline
-------------------
* 09 June 2016 – Reported to vendor
* 11 June 2016 – Received acknowledgement from vendor & Patch released
Author
------
> **Ashfaq Ansari**
> ashfaq[at]payatu[dot]com
> **[@HackSysTeam](https://twitter.com/HackSysTeam) | [Blog](http://hacksys.vfreaks.com/ "HackSys Team") | [null](http://null.co.in/profile/411-ashfaq-ansari)**
> 
> [http://www.payatu.com/](http://www.payatu.com/ "Payatu Technologies Pvt. Ltd.")
License
-------
Please see the file `LICENSE` for copying permission
------------------------------------------------------------------------
[http://hacksys.vfreaks.com](http://hacksys.vfreaks.com)

[4.0K] /data/pocs/9f6418004512d5def278a227449d3180a69fffba
├── [4.4K] CVE-2017-5005.mach
├── [ 34K] LICENSE
├── [ 16K] Non-ASLR-Modules.csv
├── [ 19M] Quick Heal Exploit Demo.avi
├── [ 50K] Quick Heal Exploit Demo.png
└── [1.9K] README.md
0 directories, 6 files