Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx | x_refsource_CONFIRM |
http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html | x_refsource_MISC |
http://www.securityfocus.com/archive/1/530915/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://seclists.org/fulldisclosure/2014/Feb/1 | mailing-list x_refsource_FULLDISC |
http://osvdb.org/102762 | vdb-entry x_refsource_OSVDB |
http://www.securitytracker.com/id/1029713 | vdb-entry x_refsource_SECTRACK |
http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/ | x_refsource_MISC |
http://www.securityfocus.com/bid/65286 | vdb-entry x_refsource_BID |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx | x_refsource_CONFIRM x_transferred |
http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html | x_refsource_MISC x_transferred |
http://www.securityfocus.com/archive/1/530915/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://seclists.org/fulldisclosure/2014/Feb/1 | mailing-list x_refsource_FULLDISC x_transferred |
http://osvdb.org/102762 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.securitytracker.com/id/1029713 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/ | x_refsource_MISC x_transferred |
http://www.securityfocus.com/bid/65286 | vdb-entry x_refsource_BID x_transferred |
Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.6 | MEDIUM | AV:L/AC:L/Au:N/C:N/I:P/A:C |