Zero-Day Exploit Found in Kaspersky Antivirus

Status
Not open for further replies.

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
Kaspersky quickly rolls out update to fix the issue
Tavis Ormandy, an Information Security Engineer at Google, has found a zero-day exploit in Kaspersky's antivirus product, as he announced on Twitter last Saturday.

According to Ormandy's tweet, the Google security researcher had found a zero-day exploit in Kaspersky's antivirus, versions 15.x and 16.x.

Later on he detailed the vulnerability as "a remote, zero interaction SYSTEM exploit, in default config."

Basically, the Kaspersky zero-day bug would have permitted an attacker to easily infiltrate the victim's computer, and gain system-level privileges, allowing him to carry on any kind of attacks without restrictions.

The Kaspersky team was very responsive to a tweet seeking contact with their security staff, even the company's president, Eugene Kaspersky, getting involved and making sure the vulnerability was properly and privately disclosed.

Kaspersky announced an update in less than 24 hours
One day later, on Sunday morning, Kaspersky announced a worldwide update for its product.

Since so little details were provided on Twitter, and Kaspersky released an update in less than 24 hours, there are small chances this vulnerability was ever used by any malicious actor.

This is not the first time Ormandy exposed a flaw in a security product, the Google engineer previously discovering and disclosing vulnerabilities in Sophos and ESET's antivirus engines. He also found a zero-day vulnerability in Windows XP's Help and Support Center.

Security researchers like Graham Cluley have been highly critical of Ormandy in the past because he doesn't seem to want to follow regular protocol when it comes to disclosing bugs to software manufacturers.

Instead, Ormandy just puts the information online, which can easily be picked up by hackers and integrated in exploit kits. This time, the details he provided were scarcer, and he seems to have followed the "unofficial" disclosure protocol.

Softpedia reached out to Kaspersky and we'll update the article as new information comes to light.

Okay, first Kaspersky exploit finished, works great on 15 and 16. Will mail report after dinner. /cc @ryanaraine pic.twitter.com/IpifiWpoEU — Tavis Ormandy (@taviso) September 5, 2015 Kaspersky tell me they're rolling out a fix globally right now, that was less than 24hrs. — Tavis Ormandy (@taviso) September 6, 2015
 

Chromatinfish 123

Level 21
Verified
May 26, 2014
1,051
This should give the Kaspersky Cheer Leaders something to think about.!
Every software will have a zero-day exploit sooner or later.

You've seen those soap, toothpaste, and sanitizer commercials right?

Protects 99.99% of germs!

Guaranteed to wash away 99.99% of germs that causes plaque!

Wash with warm water and protects against 99.99% of all bacteria and viruses!

That .01% is bigger than you think ;)
 

frogboy

In memoriam 1961-2018
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
Every software will have a zero-day exploit sooner or later.

You've seen those soap, toothpaste, and sanitizer commercials right?

Protects 99.99% of germs!

Guaranteed to wash away 99.99% of germs that causes plaque!

Wash with warm water and protects against 99.99% of all bacteria and viruses!

That .01% is bigger than you think ;)
Very clever analogy i think. ;):D
 

Enju

Level 9
Verified
Well-known
Jul 16, 2014
443
This should give the Kaspersky Cheer Leaders something to think about.!
Every software running as System is an attractive target, especially software with file I/O. Also every software has bugs and exploits, even Hello World programs can have compiler errors...
I wonder which AV is next on his list. He is the same guy who brought you the Eset exploit a few months ago, and multiple exploits in Sophos a few years back.
Hopefully every single one! :D
 

woomera

Level 7
Verified
Jan 15, 2012
594
just saw the news on softpedia and came here next :D

i actually like to see people with his skills to test every security softwares, more flaws discovered means more secure programs for users to use. and even though i dont like kaspersky im not gonna comment on that...
 

Tony Cole

Level 27
Verified
May 11, 2014
1,639
Dealt with quickly, I wonder how many other security vendors would have patched the vulnerability with 24hrs.

P.S. they don't kill 99.9%, Hbiscrub applied for 2-3 minutes only approx 72% in 1-3 people.
 
R

Rod McCarthy

I wonder which AV is next on his list. He is the same guy who brought you the Eset exploit a few months ago, and multiple exploits in Sophos a few years back.


Well this guy is not going to be so lucky with his exploit when he tries this crap on PC Matic...
 
  • Like
Reactions: Chromatinfish 123

Chromatinfish 123

Level 21
Verified
May 26, 2014
1,051
Oh you mean that crap with 840 FP in the VB100 test? :D
Sorry to bust your bubble but I'm 100% certain PC Matic with the glorious ThreatTrack (Viper) engine and the horrible whitelist isn't as secure as you think...
He's probably just kidding :rolleyes:
 
  • Like
Reactions: Enju
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top