Secunia Security Advisory - Two vulnerabilities have been reported in Quick Heal AntiVirus, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
0c707b63f65cd5931c8307044364d6a2af1cd06532f5bccfb66c226801499e29
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Quick Heal AntiVirus Two Unspecified Vulnerabilities
SECUNIA ADVISORY ID:
SA36582
VERIFY ADVISORY:
http://secunia.com/advisories/36582/
DESCRIPTION:
Two vulnerabilities have been reported in Quick Heal AntiVirus, which
can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a vulnerable system.
1) An unspecified error can be exploited to cause a stack-based
buffer overflow and may allow execution of arbitrary code. No further
information is currently available.
This vulnerability is reported in Quick Heal AntiVirus 2008 version
9.50 for Windows. Other versions may also be affected.
2) An unspecified error can be exploited to cause a heap overflow. No
further information is currently available.
This vulnerability is reported in Quick Heal AntiVirus 2008 version
9.50 for Linux. Other versions may also be affected.
SOLUTION:
Due to the very limited available information, it is not possible to
suggest an effective workaround.
PROVIDED AND/OR DISCOVERED BY:
Reportedly modules for VulnDisco Pack.
ORIGINAL ADVISORY:
http://intevydis.com/vd-list.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------