Zero-Day Exploit Found in Kaspersky Antivirus

Status
Not open for further replies.

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
48,602
8,380
USA
Kaspersky quickly rolls out update to fix the issue
Tavis Ormandy, an Information Security Engineer at Google, has found a zero-day exploit in Kaspersky's antivirus product, as he announced on Twitter last Saturday.

According to Ormandy's tweet, the Google security researcher had found a zero-day exploit in Kaspersky's antivirus, versions 15.x and 16.x.

Later on he detailed the vulnerability as "a remote, zero interaction SYSTEM exploit, in default config."

Basically, the Kaspersky zero-day bug would have permitted an attacker to easily infiltrate the victim's computer, and gain system-level privileges, allowing him to carry on any kind of attacks without restrictions.

The Kaspersky team was very responsive to a tweet seeking contact with their security staff, even the company's president, Eugene Kaspersky, getting involved and making sure the vulnerability was properly and privately disclosed.

Kaspersky announced an update in less than 24 hours
One day later, on Sunday morning, Kaspersky announced a worldwide update for its product.

Since so little details were provided on Twitter, and Kaspersky released an update in less than 24 hours, there are small chances this vulnerability was ever used by any malicious actor.

This is not the first time Ormandy exposed a flaw in a security product, the Google engineer previously discovering and disclosing vulnerabilities in Sophos and ESET's antivirus engines. He also found a zero-day vulnerability in Windows XP's Help and Support Center.

Security researchers like Graham Cluley have been highly critical of Ormandy in the past because he doesn't seem to want to follow regular protocol when it comes to disclosing bugs to software manufacturers.

Instead, Ormandy just puts the information online, which can easily be picked up by hackers and integrated in exploit kits. This time, the details he provided were scarcer, and he seems to have followed the "unofficial" disclosure protocol.

Softpedia reached out to Kaspersky and we'll update the article as new information comes to light.

Okay, first Kaspersky exploit finished, works great on 15 and 16. Will mail report after dinner. /cc @ryanaraine pic.twitter.com/IpifiWpoEU — Tavis Ormandy (@taviso) September 5, 2015 Kaspersky tell me they're rolling out a fix globally right now, that was less than 24hrs. — Tavis Ormandy (@taviso) September 6, 2015
 
This should give the Kaspersky Cheer Leaders something to think about.!
Every software will have a zero-day exploit sooner or later.

You've seen those soap, toothpaste, and sanitizer commercials right?

Protects 99.99% of germs!

Guaranteed to wash away 99.99% of germs that causes plaque!

Wash with warm water and protects against 99.99% of all bacteria and viruses!

That .01% is bigger than you think ;)
 
Every software will have a zero-day exploit sooner or later.

You've seen those soap, toothpaste, and sanitizer commercials right?

Protects 99.99% of germs!

Guaranteed to wash away 99.99% of germs that causes plaque!

Wash with warm water and protects against 99.99% of all bacteria and viruses!

That .01% is bigger than you think ;)
Very clever analogy i think. ;):D
 
This should give the Kaspersky Cheer Leaders something to think about.!
Every software running as System is an attractive target, especially software with file I/O. Also every software has bugs and exploits, even Hello World programs can have compiler errors...
I wonder which AV is next on his list. He is the same guy who brought you the Eset exploit a few months ago, and multiple exploits in Sophos a few years back.
Hopefully every single one! :D
 
just saw the news on softpedia and came here next :D

i actually like to see people with his skills to test every security softwares, more flaws discovered means more secure programs for users to use. and even though i dont like kaspersky im not gonna comment on that...
 
Dealt with quickly, I wonder how many other security vendors would have patched the vulnerability with 24hrs.

P.S. they don't kill 99.9%, Hbiscrub applied for 2-3 minutes only approx 72% in 1-3 people.
 
I wonder which AV is next on his list. He is the same guy who brought you the Eset exploit a few months ago, and multiple exploits in Sophos a few years back.


Well this guy is not going to be so lucky with his exploit when he tries this crap on PC Matic...
 
  • Like
Reactions: Chromatinfish 123
Well this guy is not going to be so lucky with his exploit when he tries this crap on PC Matic...
Oh you mean that crap with 840 FP in the VB100 test? :D
Sorry to bust your bubble but I'm 100% certain PC Matic with the glorious ThreatTrack (Viper) engine and the horrible whitelist isn't as secure as you think...
 
Status
Not open for further replies.