Subscribe via feed.

Kaspersky Antivirus DEX File Format Parsing Memory Corruption

Posted by deepcore on October 14, 2015 – 10:26 am

Fuzzing the DEX file format found a crash that loads a function pointer from an attacker controlled pointer, on Windows this results in a call to an unmapped address. This is obviously exploitable for remote, zero-interaction code execution as NT AUTHORITYSYSTEM on any system with Kaspersky Antivirus.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.