Sophos Anti-Virus < 10.0.9 / 10.2.1 Multiple Vulnerabilities

high Nessus Plugin ID 62948


The remote Windows host has an antivirus application that is affected by multiple vulnerabilities.


According to its version number, the Sophos Anti-Virus installation on the remote Windows host is affected by multiple vulnerabilities :

- An integer overflow exists when parsing Visual Basic 6 controls.

- An ASLR bypass exists in 'sophos_detoured_x64.dll'.

- A universal cross-site scripting vulnerability exists in the template for the LSP block page.

- A memory corruption issue exists in the Microsoft CAB parsers.

- A memory corruption issue exists in the RAR virtual machine standard filters.

- A privilege escalation vulnerability exists in the network update service.

- A stack-based buffer overflow issue exists in the PDF file decrypter.


Upgrade to Sophos Anti-Virus version 10.0.9 / 10.2.1 or later.

See Also

Plugin Details

Severity: High

ID: 62948

File Name: sophos_10_0_9.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 11/16/2012

Updated: 8/8/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:sophos:sophos_anti-virus

Required KB Items: Antivirus/Sophos/installed, Antivirus/Sophos/prod_ver

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/5/2012

Vulnerability Publication Date: 11/5/2012

Reference Information

BID: 56401

CERT: 662243