Skip to content
CVE-2017-5005 for Quick Heal Antivirus
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
CVE-2017-5005.mach
LICENSE
Non-ASLR-Modules.csv
Quick Heal Exploit Demo.avi
Quick Heal Exploit Demo.png
README.md

README.md

QuickHeal

CVE-2017-5005 for Quick Heal Antivirus

Advisory

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability.

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

Vulnerability Description

We found that the Quick Heal Internet Security is vulnerable to Out of Bound Write on Stack Buffer due to improper validation of LC_UNIXTHREAD.cmdsize (Mach-O).

This vulnerability can be exploited to gain Remote Code Execution as well as Privilege Escalation.

Proof of Concept

Quick Heal Exploit Demo

Vendor

http://www.quickheal.co.in/

Products

  • Quick Heal Internet Security 10.1.0.316 and prior
  • Quick Heal Total Security 10.1.0.316 and prior
  • Quick Heal AntiVirus Pro 10.1.0.316 and prior

Disclosure Timeline

  • 09 June 2016 – Reported to vendor
  • 11 June 2016 – Received acknowledgement from vendor & Patch released

Author

Ashfaq Ansari

ashfaq[at]payatu[dot]com

@HackSysTeam | Blog | null

Payatu Technologies

http://www.payatu.com/

License

Please see the file LICENSE for copying permission


http://hacksys.vfreaks.com

HackSys Team

You can’t perform that action at this time.