A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been classified as critical. This affects the function sprintf of the component USB Password Handler. The manipulation leads to buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.295971 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.295971 | Third Party Advisory VDB Entry |
https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md | Exploit Third Party Advisory |
Configurations
History
27 Jun 2025, 17:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.295971 - Permissions Required, Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?id.295971 - Third Party Advisory, VDB Entry | |
First Time |
Escanav
Escanav escan Anti-virus |
|
CPE | cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:* |
18 Feb 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md - |
17 Feb 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-17 01:15
Updated : 2025-06-27 17:46
NVD link : CVE-2025-1367
Mitre link : CVE-2025-1367
CVE.ORG link : CVE-2025-1367
JSON object : View
Products Affected
escanav
- escan_anti-virus