ID CVE-2010-5159
Summary Race condition in Dr.Web Security Space Pro 6.0.0.03100 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
References
Vulnerable Configurations
  • cpe:2.3:a:drweb:web_security_space:6.0.0.03100:-:professional:*:*:*:*:*
    cpe:2.3:a:drweb:web_security_space:6.0.0.03100:-:professional:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
CVSS
Base: 6.2 (as of 21-03-2024 - 02:19)
Impact:
Exploitability:
CWE CWE-362
CAPEC
  • Leveraging Race Conditions
    The adversary targets a race condition occurring when multiple processes access and manipulate the same resource concurrently, and the outcome of the execution depends on the particular order in which the access takes place. The adversary can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance, a race condition can occur while accessing a file: the adversary can trick the system by replacing the original file with his version and cause the system to read the malicious file.
  • Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
    This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. A typical example is file access. The adversary can leverage a file access race condition by "running the race", meaning that they would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the adversary could replace or modify the file, causing the application to behave unexpectedly.
Access
VectorComplexityAuthentication
LOCAL HIGH NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:H/Au:N/C:C/I:C/A:C
refmap via4
bid 39924
bugtraq 20100505 KHOBE - 8.0 earthquake for Windows desktop security software
fulldisc 20100505 KHOBE - 8.0 earthquake for Windows desktop security software
misc
osvdb 67660
Last major update 21-03-2024 - 02:19
Published 25-08-2012 - 21:55
Last modified 21-03-2024 - 02:19
Back to Top