Vulnerability Description
Stack-based buffer overflow in pepoly.dll in Quick Heal AntiVirus Pro 7.0.0.1 allows local users to execute arbitrary code or cause a denial of service (process crash) via a long *.text value in a PE file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Quickheal | Antivirus Pro | 7.0.0.1 |
Related Weaknesses (CWE)
References
- http://osvdb.org/101130
- http://packetstormsecurity.com/files/124477/QuickHeal-AntiVirus-7.0.0.1-Stack-BuExploit
- http://seclists.org/bugtraq/2013/Dec/90
- http://www.exploit-db.com/exploits/30374
- http://www.securityfocus.com/bid/64402Exploit
- http://www.vulnerability-lab.com/get_content.php?id=1171Exploit
- http://osvdb.org/101130
- http://packetstormsecurity.com/files/124477/QuickHeal-AntiVirus-7.0.0.1-Stack-BuExploit
- http://seclists.org/bugtraq/2013/Dec/90
- http://www.exploit-db.com/exploits/30374
- http://www.securityfocus.com/bid/64402Exploit
- http://www.vulnerability-lab.com/get_content.php?id=1171Exploit
FAQ
What is CVE-2013-6767?
CVE-2013-6767 is a vulnerability with a CVSS score of 7.2 (HIGH). Stack-based buffer overflow in pepoly.dll in Quick Heal AntiVirus Pro 7.0.0.1 allows local users to execute arbitrary code or cause a denial of service (process crash) via a long *.text value in a PE ...
How severe is CVE-2013-6767?
CVE-2013-6767 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6767?
Check the references section above for vendor advisories and patch information. Affected products include: Quickheal Antivirus Pro.