CVE编号
CVE-2010-5155利用情况
暂无补丁情况
N/A披露时间
2012-08-26漏洞描述
** DISPUTED ** Race condition in Blink Professional 4.6.1 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html | |
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html | |
http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ | |
http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-... | |
http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-se... | |
http://www.f-secure.com/weblog/archives/00001949.html | |
http://www.osvdb.org/67660 | |
http://www.securityfocus.com/bid/39924 | |
http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | eeye | blink | 4.6.1 | - |
- 攻击路径 本地
- 攻击复杂度 高
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 完全地
- 保密性 完全地
- 完整性 完全地
还没有评论,来说两句吧...