Race condition in CA Internet Security Suite Plus 2010 6.0.0.272 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Race condition in CA Internet Security Suite Plus 2010 6.0.0.272 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html | mailing-list x_refsource_BUGTRAQ |
http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ | x_refsource_MISC |
http://www.securityfocus.com/bid/39924 | vdb-entry x_refsource_BID |
http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php | x_refsource_MISC |
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html | mailing-list x_refsource_FULLDISC |
http://www.osvdb.org/67660 | vdb-entry x_refsource_OSVDB |
http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ | x_refsource_MISC |
http://www.f-secure.com/weblog/archives/00001949.html | x_refsource_MISC |
http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php | x_refsource_MISC |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html | mailing-list x_refsource_BUGTRAQ x_transferred |
http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ | x_refsource_MISC x_transferred |
http://www.securityfocus.com/bid/39924 | vdb-entry x_refsource_BID x_transferred |
http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php | x_refsource_MISC x_transferred |
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html | mailing-list x_refsource_FULLDISC x_transferred |
http://www.osvdb.org/67660 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ | x_refsource_MISC x_transferred |
http://www.f-secure.com/weblog/archives/00001949.html | x_refsource_MISC x_transferred |
http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php | x_refsource_MISC x_transferred |
Race condition in CA Internet Security Suite Plus 2010 6.0.0.272 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 6.2 | MEDIUM | AV:L/AC:H/Au:N/C:C/I:C/A:C |