A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects the function ReadConfiguration of the file /opt/MicroWorld/etc/mwav.conf. The manipulation of the argument BasePath leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.295972 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.295972 | Third Party Advisory VDB Entry |
https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md | Exploit Third Party Advisory |
Configurations
History
27 Jun 2025, 17:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:* | |
First Time |
Escanav
Escanav escan Anti-virus |
|
References | () https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.295972 - Permissions Required, Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?id.295972 - Third Party Advisory, VDB Entry |
18 Feb 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md - | |
Summary |
|
17 Feb 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-17 02:15
Updated : 2025-06-27 17:45
NVD link : CVE-2025-1368
Mitre link : CVE-2025-1368
CVE.ORG link : CVE-2025-1368
JSON object : View
Products Affected
escanav
- escan_anti-virus