Kaspersky Labs Anti-Virus IOCTL Local Privilege Escalation

High Nessus Plugin ID 23996


The remote Windows host contains an application that is prone to a local privilege escalation issue.


The version of Kaspersky Anti-Virus installed on the remote host allows a local attacker to execute arbitrary code with kernel privileges by passing a specially crafted Irp structure to an IOCTL handler used by the KLIN and KLICK device drivers. By leveraging this flaw, a local attacker may be able to gain complete control of the affected system.


Update the virus signatures after 10/12/2006 and restart the computer.

See Also





Plugin Details

Severity: High

ID: 23996

File Name: kaspersky_klin_ioctl_priv_escalation.nasl

Version: $Revision: 1.15 $

Type: local

Agent: windows

Family: Windows

Published: 2007/01/09

Modified: 2016/05/16

Dependencies: 20284

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:ND/RC:ND

Vulnerability Information

CPE: cpe:/a:kaspersky_lab:kaspersky_anti-virus

Required KB Items: Antivirus/Kaspersky/sigs

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/10/20

Vulnerability Publication Date: 2006/10/19

Reference Information

CVE: CVE-2006-4926

BID: 20635

OSVDB: 29891