Kaspersky Anti-Virus software is a multi-platform anti-virus software package that is developed by Kaspersky Labs.
A locally exploitable exceptional condition error exists in the KAVdaemon module of Kaspersky Labs' Anti-Virus software. The flaw can lead to a denial-of-service condition.
KAVdaemon uses a Unix domain socket to listen for requests. Every time a request comes, a new process is spawned without a limit. Thus, by sending a large number of requests, an attacker can cause a DoS because the processes are running as root. The processes, therefore, are not counted against the attacker's limits.
Any user can send requests, as the var/run/AvpCtl file is world-writable. This bug does not require an exploit. An attacker may simply run AvpDaemonClient (DaemonClients/Sample/) several times.
Vulnerabilities in anti-virus software can be very troublesome, as these products are supposed to increase security.
iDEFENSE has proof of concept exploit code demonstrating the impact of this vulnerability.
The latest version of Kaspersky Anti-Virus for Linux, 4.0, is vulnerable. It is suspected that previous versions are vulnerable as well.
No vendor fix is currently available.
A Mitre Corp. Common Vulnerabilities and Exposures (CVE) number has not been assigned to this issue.
04/20/2003 Exploit acquired by iDEFENSE
07/01/2003 Initial vendor notification
07/15/2003 iDEFENSE Clients notified
07/29/2003 Public Disclosure
This vulnerability is credited to Peter Kosinar.
Get paid for vulnerability research
Copyright © 2004 Verisign, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email email@example.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,