Kaspersky Antivirus DEX File Format Parsing Memory Corruption
Posted by deepcore on October 14, 2015 – 10:26 am
Fuzzing the DEX file format found a crash that loads a function pointer from an attacker controlled pointer, on Windows this results in a call to an unmapped address. This is obviously exploitable for remote, zero-interaction code execution as NT AUTHORITYSYSTEM on any system with Kaspersky Antivirus.
Post a reply
You must be logged in to post a comment.