Vulnerabilites related to comodo - comodo_internet_security
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "C89FF93F-7748-445C-A847-4633A8320DCA", "versionEndIncluding": "5.3.174622.1216", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*", "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*", "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*", "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file." }, { "lang": "es", "value": "El componente Antivirus en Comodo Internet Security anterior a v5.3.175888.1227 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero comprimido manipulado." } ], "id": "CVE-2011-5122", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.870", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-04-20 04:02
Modified
2025-04-11 00:51
Severity ?
Summary
Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "737EAF48-16CA-426A-9D4A-ECBAC60FB2C4", "versionEndIncluding": "5.9.221665.2197", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*", "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*", "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*", "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*", "matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*", "matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*", "matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*", "matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.4.189822.1355:*:*:*:*:*:*:*", "matchCriteriaId": "2D56A473-CD6A-4CB7-B0DC-4FA257366538", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.5.195786.1383:*:*:*:*:*:*:*", "matchCriteriaId": "793C57D0-AD6B-4BA8-B147-5CFF6D571B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.8.211697.2124:*:*:*:*:*:*:*", "matchCriteriaId": "F60D7950-4921-4729-9332-3FCEFF162D70", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.8.213334.2131:*:*:*:*:*:*:*", "matchCriteriaId": "35B9DC28-BC27-4CEE-BA99-4A4CC87442E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.9.219863.2196:*:*:*:*:*:*:*", "matchCriteriaId": "CD88B8DF-8C7D-47D6-AC37-9ECAFF4AF141", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value." }, { "lang": "es", "value": "Comodo Internet Security antes de v5.10.228257.2253 en Windows 7 para la plataforma x64 permite a usuarios locales provocar una denegaci\u00f3n de servicio (por ca\u00edda del sistema) a trav\u00e9s de un fichero Portable Executable (PE) de 32-bits espec\u00edficamente modificado para este fin con el valor \u0027kernel\u0027 en ImageBase." } ], "id": "CVE-2012-2273", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-04-20T04:02:52.433", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/48928" }, { "source": "cve@mitre.org", "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/53163" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1026982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026982" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "C89FF93F-7748-445C-A847-4633A8320DCA", "versionEndIncluding": "5.3.174622.1216", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*", "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*", "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*", "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors." }, { "lang": "es", "value": "El componente de antivirus en Comodo Internet Security anterior a v5.3.175888.1227 no comprueba si los certificados X.509 en archivos ejecutables firmados han sido revocados, lo cual tiene un impacto desconocido y vectores de ataque remotos tambi\u00e9n desconocidos." } ], "id": "CVE-2011-5123", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.917", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_internet_security | * | |
comodo | comodo_internet_security | 3.0.14.276 | |
comodo | comodo_internet_security | 3.0.15.277 | |
comodo | comodo_internet_security | 3.0.16.295 | |
comodo | comodo_internet_security | 3.0.17.304 | |
comodo | comodo_internet_security | 3.0.18.309 | |
comodo | comodo_internet_security | 3.0.19.318 | |
comodo | comodo_internet_security | 3.0.20.320 | |
comodo | comodo_internet_security | 3.0.22.349 | |
comodo | comodo_internet_security | 3.0.23.364 | |
comodo | comodo_internet_security | 3.0.24.368 | |
comodo | comodo_internet_security | 3.5.53896.424 | |
comodo | comodo_internet_security | 3.5.54375.427 | |
comodo | comodo_internet_security | 3.5.55810.432 | |
comodo | comodo_internet_security | 3.5.57173.439 | |
comodo | comodo_internet_security | 3.8.64263.468 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73D5F0B8-3509-4E1E-8904-BC91E18899E0", "versionEndIncluding": "3.8.64739.471", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file." }, { "lang": "es", "value": "El componente Antivirus en Comodo Internet Security anterior a v3.8.65951.477 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero manipulado." } ], "id": "CVE-2009-5126", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.527", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_internet_security | * | |
comodo | comodo_internet_security | 3.0.14.276 | |
comodo | comodo_internet_security | 3.0.15.277 | |
comodo | comodo_internet_security | 3.0.16.295 | |
comodo | comodo_internet_security | 3.0.17.304 | |
comodo | comodo_internet_security | 3.0.18.309 | |
comodo | comodo_internet_security | 3.0.19.318 | |
comodo | comodo_internet_security | 3.0.20.320 | |
comodo | comodo_internet_security | 3.0.22.349 | |
comodo | comodo_internet_security | 3.0.23.364 | |
comodo | comodo_internet_security | 3.0.24.368 | |
comodo | comodo_internet_security | 3.5.53896.424 | |
comodo | comodo_internet_security | 3.5.54375.427 | |
comodo | comodo_internet_security | 3.5.55810.432 | |
comodo | comodo_internet_security | 3.5.57173.439 | |
comodo | comodo_internet_security | 3.8.64263.468 | |
comodo | comodo_internet_security | 3.8.64739.471 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "322EF024-016D-4197-9303-451DA665EA98", "versionEndIncluding": "3.8.65951.477", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format." }, { "lang": "es", "value": "Comodo Internet Security anterior a v3.9.95478.509 permite a atacantes remotos saltarse la detecci\u00f3n de c\u00f3digo malicioso en un fichero RAR a trav\u00e9s de una manipulaci\u00f3n no especificada o del formato del fichero." } ], "id": "CVE-2009-5125", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.480", "references": [ { "source": "cve@mitre.org", "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html" }, { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/503018" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/503018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34737" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F353272-B716-43C5-A001-20A8257238F3", "versionEndIncluding": "5.5.195786.1383", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*", "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*", "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*", "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*", "matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*", "matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*", "matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*", "matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.4.189822.1355:*:*:*:*:*:*:*", "matchCriteriaId": "2D56A473-CD6A-4CB7-B0DC-4FA257366538", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples condiciones de carrera (race conditions) en Comodo Internet Security anterior a 5.8.211697.2124 permite a usuarios locales saltarse la caracter\u00edstica Defense+ a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-5119", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.763", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_internet_security | * | |
comodo | comodo_internet_security | 3.0.14.276 | |
comodo | comodo_internet_security | 3.0.15.277 | |
comodo | comodo_internet_security | 3.0.16.295 | |
comodo | comodo_internet_security | 3.0.17.304 | |
comodo | comodo_internet_security | 3.0.18.309 | |
comodo | comodo_internet_security | 3.0.19.318 | |
comodo | comodo_internet_security | 3.0.20.320 | |
comodo | comodo_internet_security | 3.0.22.349 | |
comodo | comodo_internet_security | 3.0.23.364 | |
comodo | comodo_internet_security | 3.0.24.368 | |
comodo | comodo_internet_security | 3.0.25.378 | |
comodo | comodo_internet_security | 3.5.53896.424 | |
comodo | comodo_internet_security | 3.5.54375.427 | |
comodo | comodo_internet_security | 3.5.55810.432 | |
comodo | comodo_internet_security | 3.5.57173.439 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "28D408E5-7518-4411-BD02-B7D1889FE15C", "versionEndIncluding": "3.8.64263.468", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file." }, { "lang": "es", "value": "El componente Antivirus en Comodo Internet Security anterior a v3.8.64739.471 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero manipulado." } ], "id": "CVE-2009-5127", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.573", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-18 20:15
Modified
2024-11-21 04:32
Severity ?
Summary
An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html | Release Notes, Vendor Advisory | |
cve@mitre.org | https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215 | Exploit, Third Party Advisory | |
cve@mitre.org | https://safebreach.com/blog | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://safebreach.com/blog | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_internet_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "92B42BAB-EB62-49AB-9260-812DCFBAAC1A", "versionEndExcluding": "12.1.0.6914", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms." }, { "lang": "es", "value": "Se detect\u00f3 un problema en la biblioteca signmgr.dll versi\u00f3n 6.5.0.819 en Comodo Internet Security versiones hasta 12.0. Una vulnerabilidad de Precarga de DLL permite a un atacante implantar una DLL sin firmar llamada iLog.dll en un directorio de productos parcialmente desprotegido. Esta DLL es luego cargada en un servicio muy privilegio antes de que se cargue la l\u00f3gica de comprobaci\u00f3n de firma binaria, y puede omitir algunos de los mecanismos de autodefensa." } ], "id": "CVE-2019-18215", "lastModified": "2024-11-21T04:32:50.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-18T20:15:11.223", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://safebreach.com/blog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://safebreach.com/blog" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_internet_security | * | |
comodo | comodo_internet_security | 3.0.14.276 | |
comodo | comodo_internet_security | 3.0.15.277 | |
comodo | comodo_internet_security | 3.0.16.295 | |
comodo | comodo_internet_security | 3.0.17.304 | |
comodo | comodo_internet_security | 3.0.18.309 | |
comodo | comodo_internet_security | 3.0.19.318 | |
comodo | comodo_internet_security | 3.0.20.320 | |
comodo | comodo_internet_security | 3.0.22.349 | |
comodo | comodo_internet_security | 3.0.23.364 | |
comodo | comodo_internet_security | 3.0.24.368 | |
comodo | comodo_internet_security | 3.0.25.378 | |
comodo | comodo_internet_security | 3.5.53896.424 | |
comodo | comodo_internet_security | 3.5.54375.427 | |
comodo | comodo_internet_security | 3.5.55810.432 | |
comodo | comodo_internet_security | 3.5.57173.439 | |
comodo | comodo_internet_security | 3.8.64263.468 | |
comodo | comodo_internet_security | 3.8.64739.471 | |
comodo | comodo_internet_security | 3.8.65951.477 | |
comodo | comodo_internet_security | 3.9.95478.509 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "46541CB0-CF35-4D11-B1AD-3887C6ED7966", "versionEndIncluding": "3.10.102363.531", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file." }, { "lang": "es", "value": "El componente Antivirus en Comodo Internet Security anterior a v3.11.108364.552 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de un fichero comprimido manipulado." } ], "id": "CVE-2009-5123", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.340", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "C89FF93F-7748-445C-A847-4633A8320DCA", "versionEndIncluding": "5.3.174622.1216", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*", "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*", "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*", "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors." }, { "lang": "es", "value": "El componente Antivirus en Comodo Internet Security anterior a v5.3.175888.1227 no comprueba correctamente si no especificados certificados X.509 se revocan, la cual tiene un impacto desconocido y vectores de ataque remotos tambi\u00e9n desconocidos." } ], "id": "CVE-2011-5121", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.840", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-25 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_internet_security | * | |
microsoft | windows_xp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6601C339-8C8F-4C81-A4C4-FF1C3E865897", "versionEndIncluding": "4.0.141842.828", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*", "matchCriteriaId": "E61F1C9B-44AF-4B35-A7B2-948EEF7639BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack." }, { "lang": "es", "value": "Condici\u00f3n de Carrera en Comodo Internet Security antes de v4.1.149672.916 para Windows XP permite a usuarios locales eludir los manejadores de hooks a nivel de kernel, y ejecutar c\u00f3digo peligroso que de otra manera ser\u00eda bloqueada por el manejador y no por una detecci\u00f3n basada en firma de malware. Esto se consigue a trav\u00e9s de ciertos cambios en la memoria de espacio de usuario durante la ejecuci\u00f3n del manejador de hooks. Se trata de un problema tambi\u00e9n conocido como un ataque argument-switch o un ataque KHOBE." } ], "id": "CVE-2010-5157", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-25T21:55:02.650", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html" }, { "source": "cve@mitre.org", "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/" }, { "source": "cve@mitre.org", "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html" }, { "source": "cve@mitre.org", "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php" }, { "source": "cve@mitre.org", "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php" }, { "source": "cve@mitre.org", "url": "http://www.f-secure.com/weblog/archives/00001949.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/65254" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/67660" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/39924" }, { "source": "cve@mitre.org", "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.f-secure.com/weblog/archives/00001949.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/65254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/67660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/39924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "2191F56F-A41E-42B8-86E6-1E16F6D8B96B", "versionEndIncluding": "5.0.163652.1142", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*", "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*", "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors." }, { "lang": "es", "value": "El componente Antivirus en Comodo Internet Security anterior a v5.3.174622.1216 no comprueba adecuadamente si los certificados X.509 de ficheros ejecutables han sido revocados, lo cual tiene un impacto desconocido y vectores de ataque tambi\u00e9n desconocidos." } ], "id": "CVE-2010-5185", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.620", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6601C339-8C8F-4C81-A4C4-FF1C3E865897", "versionEndIncluding": "4.0.141842.828", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file." }, { "lang": "es", "value": "El componente Antivirus en Comodo Internet Security anterior a v4.1.150349.920 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero manipulado." } ], "id": "CVE-2010-5186", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.667", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*", "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*", "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*", "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*", "matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*", "matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*", "matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*", "matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file." }, { "lang": "es", "value": "El componente Antivirus en Comodo Internet Security anterior a v5.4.189822.1355 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de ficheros .PST manipulados." } ], "id": "CVE-2011-5120", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.793", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "06135EFC-EFB6-477D-BD31-CAA865D28FD0", "versionEndIncluding": "5.8.211697.2124", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*", "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*", "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*", "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*", "matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*", "matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*", "matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*", "matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.4.189822.1355:*:*:*:*:*:*:*", "matchCriteriaId": "2D56A473-CD6A-4CB7-B0DC-4FA257366538", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.5.195786.1383:*:*:*:*:*:*:*", "matchCriteriaId": "793C57D0-AD6B-4BA8-B147-5CFF6D571B4E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples condiciones de carrera (race conditions) en Comodo Internet Security anterior a 5.8.213334.2131 permite a usuarios locales saltarse la caracter\u00edstica Defense+ a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-5118", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.717", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_internet_security | * | |
comodo | comodo_internet_security | 3.0.14.276 | |
comodo | comodo_internet_security | 3.0.15.277 | |
comodo | comodo_internet_security | 3.0.16.295 | |
comodo | comodo_internet_security | 3.0.17.304 | |
comodo | comodo_internet_security | 3.0.18.309 | |
comodo | comodo_internet_security | 3.0.19.318 | |
comodo | comodo_internet_security | 3.0.20.320 | |
comodo | comodo_internet_security | 3.0.22.349 | |
comodo | comodo_internet_security | 3.0.23.364 | |
comodo | comodo_internet_security | 3.0.24.368 | |
comodo | comodo_internet_security | 3.0.25.378 | |
comodo | comodo_internet_security | 3.5.53896.424 | |
comodo | comodo_internet_security | 3.5.54375.427 | |
comodo | comodo_internet_security | 3.5.55810.432 | |
comodo | comodo_internet_security | 3.5.57173.439 | |
comodo | comodo_internet_security | 3.8.64263.468 | |
comodo | comodo_internet_security | 3.8.64739.471 | |
comodo | comodo_internet_security | 3.8.65951.477 | |
comodo | comodo_internet_security | 3.9.95478.509 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "46541CB0-CF35-4D11-B1AD-3887C6ED7966", "versionEndIncluding": "3.10.102363.531", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file." }, { "lang": "es", "value": "El componente Antivirus en Comodo Internet Security anterior a v3.11.108364.552 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero empaquetado manipulado." } ], "id": "CVE-2009-5124", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:43.403", "references": [ { "source": "cve@mitre.org", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2009-5125 (GCVE-0-2009-5125)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 20:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/34737 | vdb-entry, x_refsource_BID | |
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM | |
http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/503018 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:22.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34737", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34737" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html" }, { "name": "20090427 [TZO-14-2009] Comodo Antivirus RAR evasion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/503018" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34737", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34737" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html" }, { "name": "20090427 [TZO-14-2009] Comodo Antivirus RAR evasion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/503018" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-5125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34737", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34737" }, { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" }, { "name": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html", "refsource": "MISC", "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html" }, { "name": "20090427 [TZO-14-2009] Comodo Antivirus RAR evasion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/503018" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-5125", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-16T20:41:55.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-5122 (GCVE-0-2011-5122)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 00:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:40.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5122", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5122", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-17T00:46:17.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-5127 (GCVE-0-2009-5127)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:22.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-5127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-5127", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-17T03:38:21.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-5121 (GCVE-0-2011-5121)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 01:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:40.222Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5121", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5121", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-17T01:36:06.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-5186 (GCVE-0-2010-5186)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 16:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:09:39.240Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-5186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-5186", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-16T16:32:52.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-5185 (GCVE-0-2010-5185)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 16:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:09:39.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-5185", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-5185", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-16T16:53:13.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-5118 (GCVE-0-2011-5118)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 01:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:40.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5118", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-17T01:45:37.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-5119 (GCVE-0-2011-5119)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 22:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:40.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5119", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-16T22:45:12.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-5120 (GCVE-0-2011-5120)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 23:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:39.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5120", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-16T23:45:57.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-18215 (GCVE-0-2019-18215)
Vulnerability from cvelistv5
Published
2019-11-18 20:00
Modified
2024-08-05 01:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.105Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://safebreach.com/blog" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-18T20:00:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://safebreach.com/blog" }, { "tags": [ "x_refsource_MISC" ], "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-18215", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://safebreach.com/blog", "refsource": "MISC", "url": "https://safebreach.com/blog" }, { "name": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215", "refsource": "MISC", "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215" }, { "name": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html", "refsource": "MISC", "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-18215", "datePublished": "2019-11-18T20:00:48", "dateReserved": "2019-10-20T00:00:00", "dateUpdated": "2024-08-05T01:47:14.105Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-5123 (GCVE-0-2011-5123)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 02:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:40.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5123", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5123", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-17T02:47:22.893Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-5126 (GCVE-0-2009-5126)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 17:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:22.405Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-5126", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-5126", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-16T17:18:01.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2273 (GCVE-0-2012-2273)
Vulnerability from cvelistv5
Published
2012-04-20 01:00
Modified
2024-08-06 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1026982 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/53163 | vdb-entry, x_refsource_BID | |
http://www.comodo.com/home/download/release-notes.php?p=anti-malware | x_refsource_CONFIRM | |
http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/48928 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:26:09.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1026982", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026982" }, { "name": "53163", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53163" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware" }, { "name": "20120419 [CVE-2012-2273] Comodo Internet Security \u003c5.10 BSOD (Win7 x64)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html" }, { "name": "48928", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48928" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-03T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1026982", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026982" }, { "name": "53163", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53163" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware" }, { "name": "20120419 [CVE-2012-2273] Comodo Internet Security \u003c5.10 BSOD (Win7 x64)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html" }, { "name": "48928", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48928" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2273", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1026982", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026982" }, { "name": "53163", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53163" }, { "name": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware", "refsource": "CONFIRM", "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware" }, { "name": "20120419 [CVE-2012-2273] Comodo Internet Security \u003c5.10 BSOD (Win7 x64)", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html" }, { "name": "48928", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48928" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2273", "datePublished": "2012-04-20T01:00:00", "dateReserved": "2012-04-18T00:00:00", "dateUpdated": "2024-08-06T19:26:09.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-5123 (GCVE-0-2009-5123)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 16:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:23.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-5123", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-5123", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-16T16:32:45.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-5124 (GCVE-0-2009-5124)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 02:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file.
References
▼ | URL | Tags |
---|---|---|
http://personalfirewall.comodo.com/release_notes.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:22.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-26T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://personalfirewall.comodo.com/release_notes.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-5124", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://personalfirewall.comodo.com/release_notes.html", "refsource": "CONFIRM", "url": "http://personalfirewall.comodo.com/release_notes.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-5124", "datePublished": "2012-08-26T01:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-17T02:21:07.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-5157 (GCVE-0-2010-5157)
Vulnerability from cvelistv5
Published
2012-08-25 21:00
Modified
2024-09-17 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html | mailing-list, x_refsource_BUGTRAQ | |
http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/39924 | vdb-entry, x_refsource_BID | |
http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php | x_refsource_MISC | |
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html | mailing-list, x_refsource_FULLDISC | |
http://www.osvdb.org/67660 | vdb-entry, x_refsource_OSVDB | |
http://www.osvdb.org/65254 | vdb-entry, x_refsource_OSVDB | |
http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ | x_refsource_MISC | |
http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html | x_refsource_CONFIRM | |
http://www.f-secure.com/weblog/archives/00001949.html | x_refsource_MISC | |
http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:09:39.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/" }, { "name": "39924", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39924" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php" }, { "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html" }, { "name": "67660", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/67660" }, { "name": "65254", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/65254" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.f-secure.com/weblog/archives/00001949.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-25T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/" }, { "name": "39924", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39924" }, { "tags": [ "x_refsource_MISC" ], "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php" }, { "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html" }, { "name": "67660", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/67660" }, { "name": "65254", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/65254" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.f-secure.com/weblog/archives/00001949.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-5157", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html" }, { "name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/", "refsource": "MISC", "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/" }, { "name": "39924", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39924" }, { "name": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php", "refsource": "MISC", "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php" }, { "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html" }, { "name": "67660", "refsource": "OSVDB", "url": "http://www.osvdb.org/67660" }, { "name": "65254", "refsource": "OSVDB", "url": "http://www.osvdb.org/65254" }, { "name": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/", "refsource": "MISC", "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/" }, { "name": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html", "refsource": "CONFIRM", "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html" }, { "name": "http://www.f-secure.com/weblog/archives/00001949.html", "refsource": "MISC", "url": "http://www.f-secure.com/weblog/archives/00001949.html" }, { "name": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php", "refsource": "MISC", "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-5157", "datePublished": "2012-08-25T21:00:00Z", "dateReserved": "2012-08-25T00:00:00Z", "dateUpdated": "2024-09-17T03:55:02.968Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }