Vulnerabilites related to comodo - comodo_internet_security
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89FF93F-7748-445C-A847-4633A8320DCA",
              "versionEndIncluding": "5.3.174622.1216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
              "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file."
    },
    {
      "lang": "es",
      "value": "El componente Antivirus en Comodo Internet Security anterior a v5.3.175888.1227 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero comprimido manipulado."
    }
  ],
  "id": "CVE-2011-5122",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.870",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-04-20 04:02
Modified
2025-04-11 00:51
Severity ?
Summary
Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value.
Impacted products
Vendor Product Version
comodo comodo_internet_security *
comodo comodo_internet_security 3.0.14.276
comodo comodo_internet_security 3.0.15.277
comodo comodo_internet_security 3.0.16.295
comodo comodo_internet_security 3.0.17.304
comodo comodo_internet_security 3.0.18.309
comodo comodo_internet_security 3.0.19.318
comodo comodo_internet_security 3.0.20.320
comodo comodo_internet_security 3.0.22.349
comodo comodo_internet_security 3.0.23.364
comodo comodo_internet_security 3.0.24.368
comodo comodo_internet_security 3.0.25.378
comodo comodo_internet_security 3.5.53896.424
comodo comodo_internet_security 3.5.54375.427
comodo comodo_internet_security 3.5.55810.432
comodo comodo_internet_security 3.5.57173.439
comodo comodo_internet_security 3.8.64263.468
comodo comodo_internet_security 3.8.64739.471
comodo comodo_internet_security 3.8.65951.477
comodo comodo_internet_security 3.9.95478.509
comodo comodo_internet_security 3.10.102363.531
comodo comodo_internet_security 3.11.108364.552
comodo comodo_internet_security 3.12.111745.560
comodo comodo_internet_security 3.13.121240.574
comodo comodo_internet_security 3.13.125662.579
comodo comodo_internet_security 3.14.130099.587
comodo comodo_internet_security 4.0.138377.779
comodo comodo_internet_security 4.0.141842.828
comodo comodo_internet_security 4.1.150349.920
comodo comodo_internet_security 5.0.163652.1142
comodo comodo_internet_security 5.3.174622.1216
comodo comodo_internet_security 5.3.175888.1227
comodo comodo_internet_security 5.3.176757.1236
comodo comodo_internet_security 5.3.181415.1237
comodo comodo_internet_security 5.4.189822.1355
comodo comodo_internet_security 5.5.195786.1383
comodo comodo_internet_security 5.8.211697.2124
comodo comodo_internet_security 5.8.213334.2131
comodo comodo_internet_security 5.9.219863.2196
microsoft windows_7 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737EAF48-16CA-426A-9D4A-ECBAC60FB2C4",
              "versionEndIncluding": "5.9.221665.2197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
              "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*",
              "matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.4.189822.1355:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D56A473-CD6A-4CB7-B0DC-4FA257366538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.5.195786.1383:*:*:*:*:*:*:*",
              "matchCriteriaId": "793C57D0-AD6B-4BA8-B147-5CFF6D571B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.8.211697.2124:*:*:*:*:*:*:*",
              "matchCriteriaId": "F60D7950-4921-4729-9332-3FCEFF162D70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.8.213334.2131:*:*:*:*:*:*:*",
              "matchCriteriaId": "35B9DC28-BC27-4CEE-BA99-4A4CC87442E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.9.219863.2196:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD88B8DF-8C7D-47D6-AC37-9ECAFF4AF141",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value."
    },
    {
      "lang": "es",
      "value": "Comodo Internet Security antes de v5.10.228257.2253 en Windows 7 para la plataforma x64 permite a usuarios locales provocar una denegaci\u00f3n de servicio (por ca\u00edda del sistema) a trav\u00e9s de un fichero Portable Executable (PE) de 32-bits espec\u00edficamente modificado para este fin con el valor \u0027kernel\u0027 en ImageBase."
    }
  ],
  "id": "CVE-2012-2273",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 4.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-04-20T04:02:52.433",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/48928"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/53163"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1026982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026982"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89FF93F-7748-445C-A847-4633A8320DCA",
              "versionEndIncluding": "5.3.174622.1216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
              "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "El componente de antivirus en Comodo Internet Security anterior a v5.3.175888.1227 no comprueba si los certificados X.509 en archivos ejecutables firmados han sido revocados, lo cual tiene un impacto desconocido y vectores de ataque remotos tambi\u00e9n desconocidos."
    }
  ],
  "id": "CVE-2011-5123",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.917",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73D5F0B8-3509-4E1E-8904-BC91E18899E0",
              "versionEndIncluding": "3.8.64739.471",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file."
    },
    {
      "lang": "es",
      "value": "El componente Antivirus en Comodo Internet Security anterior a v3.8.65951.477 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero manipulado."
    }
  ],
  "id": "CVE-2009-5126",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.527",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "322EF024-016D-4197-9303-451DA665EA98",
              "versionEndIncluding": "3.8.65951.477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format."
    },
    {
      "lang": "es",
      "value": "Comodo Internet Security anterior a v3.9.95478.509 permite a atacantes remotos saltarse la detecci\u00f3n de c\u00f3digo malicioso en un fichero RAR a trav\u00e9s de una manipulaci\u00f3n no especificada o del formato del fichero."
    }
  ],
  "id": "CVE-2009-5125",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.480",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/503018"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34737"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/503018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34737"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors.
Impacted products
Vendor Product Version
comodo comodo_internet_security *
comodo comodo_internet_security 3.0.14.276
comodo comodo_internet_security 3.0.15.277
comodo comodo_internet_security 3.0.16.295
comodo comodo_internet_security 3.0.17.304
comodo comodo_internet_security 3.0.18.309
comodo comodo_internet_security 3.0.19.318
comodo comodo_internet_security 3.0.20.320
comodo comodo_internet_security 3.0.22.349
comodo comodo_internet_security 3.0.23.364
comodo comodo_internet_security 3.0.24.368
comodo comodo_internet_security 3.0.25.378
comodo comodo_internet_security 3.5.53896.424
comodo comodo_internet_security 3.5.54375.427
comodo comodo_internet_security 3.5.55810.432
comodo comodo_internet_security 3.5.57173.439
comodo comodo_internet_security 3.8.64263.468
comodo comodo_internet_security 3.8.64739.471
comodo comodo_internet_security 3.8.65951.477
comodo comodo_internet_security 3.9.95478.509
comodo comodo_internet_security 3.10.102363.531
comodo comodo_internet_security 3.11.108364.552
comodo comodo_internet_security 3.12.111745.560
comodo comodo_internet_security 3.13.121240.574
comodo comodo_internet_security 3.13.125662.579
comodo comodo_internet_security 3.14.130099.587
comodo comodo_internet_security 4.0.138377.779
comodo comodo_internet_security 4.0.141842.828
comodo comodo_internet_security 4.1.150349.920
comodo comodo_internet_security 5.0.163652.1142
comodo comodo_internet_security 5.3.174622.1216
comodo comodo_internet_security 5.3.175888.1227
comodo comodo_internet_security 5.3.176757.1236
comodo comodo_internet_security 5.3.181415.1237
comodo comodo_internet_security 5.4.189822.1355



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F353272-B716-43C5-A001-20A8257238F3",
              "versionEndIncluding": "5.5.195786.1383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
              "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*",
              "matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.4.189822.1355:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D56A473-CD6A-4CB7-B0DC-4FA257366538",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples condiciones de carrera (race conditions) en Comodo Internet Security anterior a 5.8.211697.2124 permite a usuarios locales saltarse la caracter\u00edstica Defense+ a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2011-5119",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.763",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28D408E5-7518-4411-BD02-B7D1889FE15C",
              "versionEndIncluding": "3.8.64263.468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file."
    },
    {
      "lang": "es",
      "value": "El componente Antivirus en Comodo Internet Security anterior a v3.8.64739.471 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero manipulado."
    }
  ],
  "id": "CVE-2009-5127",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.573",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-18 20:15
Modified
2024-11-21 04:32
Summary
An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.
Impacted products
Vendor Product Version
comodo comodo_internet_security *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B42BAB-EB62-49AB-9260-812DCFBAAC1A",
              "versionEndExcluding": "12.1.0.6914",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en la biblioteca signmgr.dll versi\u00f3n 6.5.0.819 en Comodo Internet Security versiones hasta 12.0. Una vulnerabilidad de Precarga de DLL permite a un atacante implantar una DLL sin firmar llamada iLog.dll en un directorio de productos parcialmente desprotegido. Esta DLL es luego cargada en un servicio muy privilegio antes de que se cargue la l\u00f3gica de comprobaci\u00f3n de firma binaria, y puede omitir algunos de los mecanismos de autodefensa."
    }
  ],
  "id": "CVE-2019-18215",
  "lastModified": "2024-11-21T04:32:50.987",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-18T20:15:11.223",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://safebreach.com/blog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://safebreach.com/blog"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46541CB0-CF35-4D11-B1AD-3887C6ED7966",
              "versionEndIncluding": "3.10.102363.531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file."
    },
    {
      "lang": "es",
      "value": "El componente Antivirus en Comodo Internet Security anterior a v3.11.108364.552 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de un fichero comprimido manipulado."
    }
  ],
  "id": "CVE-2009-5123",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.340",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89FF93F-7748-445C-A847-4633A8320DCA",
              "versionEndIncluding": "5.3.174622.1216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
              "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "El componente Antivirus en Comodo Internet Security anterior a v5.3.175888.1227 no comprueba correctamente si no especificados certificados X.509 se revocan, la cual tiene un impacto desconocido y vectores de ataque remotos tambi\u00e9n desconocidos."
    }
  ],
  "id": "CVE-2011-5121",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.840",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-25 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html
cve@mitre.orghttp://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/
cve@mitre.orghttp://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html
cve@mitre.orghttp://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php
cve@mitre.orghttp://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php
cve@mitre.orghttp://www.f-secure.com/weblog/archives/00001949.html
cve@mitre.orghttp://www.osvdb.org/65254
cve@mitre.orghttp://www.osvdb.org/67660
cve@mitre.orghttp://www.securityfocus.com/bid/39924
cve@mitre.orghttp://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html
af854a3a-2127-422b-91ae-364da2661108http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/
af854a3a-2127-422b-91ae-364da2661108http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html
af854a3a-2127-422b-91ae-364da2661108http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php
af854a3a-2127-422b-91ae-364da2661108http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php
af854a3a-2127-422b-91ae-364da2661108http://www.f-secure.com/weblog/archives/00001949.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/65254
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/67660
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/39924
af854a3a-2127-422b-91ae-364da2661108http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6601C339-8C8F-4C81-A4C4-FF1C3E865897",
              "versionEndIncluding": "4.0.141842.828",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61F1C9B-44AF-4B35-A7B2-948EEF7639BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack."
    },
    {
      "lang": "es",
      "value": "Condici\u00f3n de Carrera en Comodo Internet Security antes de v4.1.149672.916 para Windows XP permite a usuarios locales eludir los manejadores de hooks a nivel de kernel, y ejecutar c\u00f3digo peligroso que de otra manera ser\u00eda bloqueada por el manejador y no por una detecci\u00f3n basada en firma de malware. Esto se consigue a trav\u00e9s de ciertos cambios en la memoria de espacio de usuario durante la ejecuci\u00f3n del manejador de hooks. Se trata de un problema tambi\u00e9n conocido como un ataque argument-switch o un ataque KHOBE."
    }
  ],
  "id": "CVE-2010-5157",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 1.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-25T21:55:02.650",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.f-secure.com/weblog/archives/00001949.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/65254"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/67660"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/39924"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.f-secure.com/weblog/archives/00001949.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/65254"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/67660"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/39924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2191F56F-A41E-42B8-86E6-1E16F6D8B96B",
              "versionEndIncluding": "5.0.163652.1142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
              "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "El componente Antivirus en Comodo Internet Security anterior a v5.3.174622.1216 no comprueba adecuadamente si los certificados X.509 de ficheros ejecutables han sido revocados, lo cual tiene un impacto desconocido y vectores de ataque tambi\u00e9n desconocidos."
    }
  ],
  "id": "CVE-2010-5185",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.620",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6601C339-8C8F-4C81-A4C4-FF1C3E865897",
              "versionEndIncluding": "4.0.141842.828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
              "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file."
    },
    {
      "lang": "es",
      "value": "El componente Antivirus en Comodo Internet Security anterior a v4.1.150349.920 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero manipulado."
    }
  ],
  "id": "CVE-2010-5186",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.667",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file.
Impacted products
Vendor Product Version
comodo comodo_internet_security 3.0.14.276
comodo comodo_internet_security 3.0.15.277
comodo comodo_internet_security 3.0.16.295
comodo comodo_internet_security 3.0.17.304
comodo comodo_internet_security 3.0.18.309
comodo comodo_internet_security 3.0.19.318
comodo comodo_internet_security 3.0.20.320
comodo comodo_internet_security 3.0.22.349
comodo comodo_internet_security 3.0.23.364
comodo comodo_internet_security 3.0.24.368
comodo comodo_internet_security 3.0.25.378
comodo comodo_internet_security 3.5.53896.424
comodo comodo_internet_security 3.5.54375.427
comodo comodo_internet_security 3.5.55810.432
comodo comodo_internet_security 3.5.57173.439
comodo comodo_internet_security 3.8.64263.468
comodo comodo_internet_security 3.8.64739.471
comodo comodo_internet_security 3.8.65951.477
comodo comodo_internet_security 3.9.95478.509
comodo comodo_internet_security 3.10.102363.531
comodo comodo_internet_security 3.11.108364.552
comodo comodo_internet_security 3.12.111745.560
comodo comodo_internet_security 3.13.121240.574
comodo comodo_internet_security 3.13.125662.579
comodo comodo_internet_security 3.14.130099.587
comodo comodo_internet_security 4.0.138377.779
comodo comodo_internet_security 4.0.141842.828
comodo comodo_internet_security 4.1.150349.920
comodo comodo_internet_security 5.0.163652.1142
comodo comodo_internet_security 5.3.174622.1216
comodo comodo_internet_security 5.3.175888.1227
comodo comodo_internet_security 5.3.176757.1236
comodo comodo_internet_security 5.3.181415.1237



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
              "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*",
              "matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file."
    },
    {
      "lang": "es",
      "value": "El componente Antivirus en Comodo Internet Security anterior a v5.4.189822.1355 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de ficheros .PST manipulados."
    }
  ],
  "id": "CVE-2011-5120",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.793",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors.
Impacted products
Vendor Product Version
comodo comodo_internet_security *
comodo comodo_internet_security 3.0.14.276
comodo comodo_internet_security 3.0.15.277
comodo comodo_internet_security 3.0.16.295
comodo comodo_internet_security 3.0.17.304
comodo comodo_internet_security 3.0.18.309
comodo comodo_internet_security 3.0.19.318
comodo comodo_internet_security 3.0.20.320
comodo comodo_internet_security 3.0.22.349
comodo comodo_internet_security 3.0.23.364
comodo comodo_internet_security 3.0.24.368
comodo comodo_internet_security 3.0.25.378
comodo comodo_internet_security 3.5.53896.424
comodo comodo_internet_security 3.5.54375.427
comodo comodo_internet_security 3.5.55810.432
comodo comodo_internet_security 3.5.57173.439
comodo comodo_internet_security 3.8.64263.468
comodo comodo_internet_security 3.8.64739.471
comodo comodo_internet_security 3.8.65951.477
comodo comodo_internet_security 3.9.95478.509
comodo comodo_internet_security 3.10.102363.531
comodo comodo_internet_security 3.11.108364.552
comodo comodo_internet_security 3.12.111745.560
comodo comodo_internet_security 3.13.121240.574
comodo comodo_internet_security 3.13.125662.579
comodo comodo_internet_security 3.14.130099.587
comodo comodo_internet_security 4.0.138377.779
comodo comodo_internet_security 4.0.141842.828
comodo comodo_internet_security 4.1.150349.920
comodo comodo_internet_security 5.0.163652.1142
comodo comodo_internet_security 5.3.174622.1216
comodo comodo_internet_security 5.3.175888.1227
comodo comodo_internet_security 5.3.176757.1236
comodo comodo_internet_security 5.3.181415.1237
comodo comodo_internet_security 5.4.189822.1355
comodo comodo_internet_security 5.5.195786.1383



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06135EFC-EFB6-477D-BD31-CAA865D28FD0",
              "versionEndIncluding": "5.8.211697.2124",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
              "matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
              "matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*",
              "matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*",
              "matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.4.189822.1355:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D56A473-CD6A-4CB7-B0DC-4FA257366538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.5.195786.1383:*:*:*:*:*:*:*",
              "matchCriteriaId": "793C57D0-AD6B-4BA8-B147-5CFF6D571B4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples condiciones de carrera (race conditions) en Comodo Internet Security anterior a 5.8.213334.2131 permite a usuarios locales saltarse la caracter\u00edstica Defense+ a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2011-5118",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.717",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46541CB0-CF35-4D11-B1AD-3887C6ED7966",
              "versionEndIncluding": "3.10.102363.531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
              "matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
              "matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
              "matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
              "matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
              "matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file."
    },
    {
      "lang": "es",
      "value": "El componente Antivirus en Comodo Internet Security anterior a v3.11.108364.552 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero empaquetado manipulado."
    }
  ],
  "id": "CVE-2009-5124",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-26T03:17:43.403",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://personalfirewall.comodo.com/release_notes.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2009-5125 (GCVE-0-2009-5125)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 20:41
Severity ?
CWE
  • n/a
Summary
Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:22.381Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34737",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34737"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html"
          },
          {
            "name": "20090427 [TZO-14-2009] Comodo Antivirus RAR evasion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503018"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34737",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34737"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html"
        },
        {
          "name": "20090427 [TZO-14-2009] Comodo Antivirus RAR evasion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503018"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5125",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34737",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34737"
            },
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            },
            {
              "name": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html",
              "refsource": "MISC",
              "url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html"
            },
            {
              "name": "20090427 [TZO-14-2009] Comodo Antivirus RAR evasion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503018"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5125",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-16T20:41:55.140Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5122 (GCVE-0-2011-5122)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 00:46
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:40.181Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5122",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5122",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-17T00:46:17.731Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5127 (GCVE-0-2009-5127)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 03:38
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:22.247Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5127",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5127",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-17T03:38:21.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5121 (GCVE-0-2011-5121)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 01:36
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:40.222Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5121",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5121",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-17T01:36:06.256Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-5186 (GCVE-0-2010-5186)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 16:32
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:09:39.240Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-5186",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-5186",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-16T16:32:52.595Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-5185 (GCVE-0-2010-5185)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 16:53
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:09:39.297Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-5185",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-5185",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-16T16:53:13.278Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5118 (GCVE-0-2011-5118)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 01:45
Severity ?
CWE
  • n/a
Summary
Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:40.237Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5118",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5118",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-17T01:45:37.762Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5119 (GCVE-0-2011-5119)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 22:45
Severity ?
CWE
  • n/a
Summary
Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:40.203Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5119",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5119",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-16T22:45:12.173Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5120 (GCVE-0-2011-5120)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 23:45
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:39.988Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5120",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5120",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-16T23:45:57.418Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-18215 (GCVE-0-2019-18215)
Vulnerability from cvelistv5
Published
2019-11-18 20:00
Modified
2024-08-05 01:47
Severity ?
CWE
  • n/a
Summary
An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:47:14.105Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://safebreach.com/blog"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-18T20:00:48",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://safebreach.com/blog"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-18215",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://safebreach.com/blog",
              "refsource": "MISC",
              "url": "https://safebreach.com/blog"
            },
            {
              "name": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215",
              "refsource": "MISC",
              "url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
            },
            {
              "name": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html",
              "refsource": "MISC",
              "url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-18215",
    "datePublished": "2019-11-18T20:00:48",
    "dateReserved": "2019-10-20T00:00:00",
    "dateUpdated": "2024-08-05T01:47:14.105Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5123 (GCVE-0-2011-5123)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 02:47
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:40.212Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5123",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5123",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-17T02:47:22.893Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5126 (GCVE-0-2009-5126)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 17:18
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:22.405Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5126",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5126",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-16T17:18:01.901Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2273 (GCVE-0-2012-2273)
Vulnerability from cvelistv5
Published
2012-04-20 01:00
Modified
2024-08-06 19:26
Severity ?
CWE
  • n/a
Summary
Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value.
References
http://www.securitytracker.com/id?1026982vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/53163vdb-entry, x_refsource_BID
http://www.comodo.com/home/download/release-notes.php?p=anti-malwarex_refsource_CONFIRM
http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.htmlmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/48928third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:09.012Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1026982",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026982"
          },
          {
            "name": "53163",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53163"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware"
          },
          {
            "name": "20120419 [CVE-2012-2273] Comodo Internet Security \u003c5.10 BSOD (Win7 x64)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html"
          },
          {
            "name": "48928",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48928"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-03T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1026982",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026982"
        },
        {
          "name": "53163",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53163"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware"
        },
        {
          "name": "20120419 [CVE-2012-2273] Comodo Internet Security \u003c5.10 BSOD (Win7 x64)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html"
        },
        {
          "name": "48928",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48928"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-2273",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1026982",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026982"
            },
            {
              "name": "53163",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53163"
            },
            {
              "name": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware",
              "refsource": "CONFIRM",
              "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware"
            },
            {
              "name": "20120419 [CVE-2012-2273] Comodo Internet Security \u003c5.10 BSOD (Win7 x64)",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html"
            },
            {
              "name": "48928",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48928"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-2273",
    "datePublished": "2012-04-20T01:00:00",
    "dateReserved": "2012-04-18T00:00:00",
    "dateUpdated": "2024-08-06T19:26:09.012Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5123 (GCVE-0-2009-5123)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-16 16:32
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:23.467Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5123",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5123",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-16T16:32:45.660Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5124 (GCVE-0-2009-5124)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-09-17 02:21
Severity ?
CWE
  • n/a
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:22.382Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://personalfirewall.comodo.com/release_notes.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-26T01:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://personalfirewall.comodo.com/release_notes.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5124",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://personalfirewall.comodo.com/release_notes.html",
              "refsource": "CONFIRM",
              "url": "http://personalfirewall.comodo.com/release_notes.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5124",
    "datePublished": "2012-08-26T01:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-17T02:21:07.449Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-5157 (GCVE-0-2010-5157)
Vulnerability from cvelistv5
Published
2012-08-25 21:00
Modified
2024-09-17 03:55
Severity ?
CWE
  • n/a
Summary
Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:09:39.227Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
          },
          {
            "name": "39924",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/39924"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
          },
          {
            "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
          },
          {
            "name": "67660",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/67660"
          },
          {
            "name": "65254",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/65254"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/weblog/archives/00001949.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-25T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
        },
        {
          "name": "39924",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/39924"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
        },
        {
          "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
        },
        {
          "name": "67660",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/67660"
        },
        {
          "name": "65254",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/65254"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.f-secure.com/weblog/archives/00001949.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-5157",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html"
            },
            {
              "name": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/",
              "refsource": "MISC",
              "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/"
            },
            {
              "name": "39924",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/39924"
            },
            {
              "name": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
              "refsource": "MISC",
              "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
            },
            {
              "name": "20100505 KHOBE - 8.0 earthquake for Windows desktop security software",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html"
            },
            {
              "name": "67660",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/67660"
            },
            {
              "name": "65254",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/65254"
            },
            {
              "name": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/",
              "refsource": "MISC",
              "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/"
            },
            {
              "name": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html",
              "refsource": "CONFIRM",
              "url": "http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-41149672916-released-t57051.0.html"
            },
            {
              "name": "http://www.f-secure.com/weblog/archives/00001949.html",
              "refsource": "MISC",
              "url": "http://www.f-secure.com/weblog/archives/00001949.html"
            },
            {
              "name": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php",
              "refsource": "MISC",
              "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-5157",
    "datePublished": "2012-08-25T21:00:00Z",
    "dateReserved": "2012-08-25T00:00:00Z",
    "dateUpdated": "2024-09-17T03:55:02.968Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}