Vulnerability Details : CVE-2006-4926
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.
Vulnerability category: Execute code
Products affected by CVE-2006-4926
- cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:windows_workstations:*:*:*:*:*
- cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:6.0:*:workstations:*:*:*:*:*
- cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus_personal_pro:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:kaspersky_lab:kaspersky_internet_security:6.0:maintenance_pack_2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4926
0.75%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4926
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2006-4926
-
http://www.securityfocus.com/bid/20635
Exploit;Patch
-
http://www.securityfocus.com/archive/1/449301/100/0/threaded
-
http://www.kaspersky.com/technews?id=203038678
Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/29677
-
http://securitytracker.com/id?1017093
Exploit;Patch
-
http://www.vupen.com/english/advisories/2006/4117
-
http://www.securityfocus.com/archive/1/449289/100/0/threaded
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425
Patch;Vendor Advisory
Jump to