Secunia Security Advisory - A vulnerability has been reported in 360 Anti-Virus and 360 Security Guard, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
dac2b9ed0340286b46a409c1779710b4879e5699a3d60ebab7bc2b7ec57826a1
----------------------------------------------------------------------
Proof-of-Concept (PoC) and Extended Analysis available for customers.
Get a free trial, contact sales@secunia.com
----------------------------------------------------------------------
TITLE:
360 Anti-Virus / Security Guard 360FkAdv.sys Denial of Service
SECUNIA ADVISORY ID:
SA39668
VERIFY ADVISORY:
http://secunia.com/advisories/39668/
DESCRIPTION:
A vulnerability has been reported in 360 Anti-Virus and 360 Security
Guard, which can be exploited by malicious, local users to cause a
DoS (Denial of Service).
The vulnerability is caused due to an error in the 360FkAdv.sys
driver when processing userspace data. This can be exploited to cause
a system crash via a specially crafted IOCTL.
The vulnerability is reported in 360 Anti-Virus versions prior to
1.1.0.1096 and 360 Security Guard versions prior to 6.1.5.1010.
SOLUTION:
Update to a fixed version.
360 Anti-Virus:
Update to version 1.1.0.1096 or later.
360 Security Guard:
Update to version 6.1.5.1010 or later.
PROVIDED AND/OR DISCOVERED BY:
NT Internals
ORIGINAL ADVISORY:
http://www.ntinternals.org/ntiadv1002/ntiadv1002.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------