Vulnerability Description
Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earlier, Total Security 10.1.0.316 and earlier, and AntiVirus Pro 10.1.0.316 and earlier on OS X allows remote attackers to execute arbitrary code via a crafted LC_UNIXTHREAD.cmdsize field in a Mach-O file that is mishandled during a Security Scan (aka Custom Scan) operation.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Quickheal | Antivirus Pro | <= 10.1.0.316 |
| Quickheal | Internet Security | <= 10.1.0.316 |
| Quickheal | Total Security | <= 10.1.0.316 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/95194Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037547Third Party AdvisoryVDB Entry
- https://github.com/payatu/QuickHealExploitThird Party Advisory
- https://www.youtube.com/watch?v=h9LOsv4XE00ExploitThird Party Advisory
- http://www.securityfocus.com/bid/95194Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037547Third Party AdvisoryVDB Entry
- https://github.com/payatu/QuickHealExploitThird Party Advisory
- https://www.youtube.com/watch?v=h9LOsv4XE00ExploitThird Party Advisory
FAQ
What is CVE-2017-5005?
CVE-2017-5005 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earlier, Total Security 10.1.0.316 and earlier, and AntiVirus Pro 10.1.0.316 and earlier on OS X allows remote attackers to e...
How severe is CVE-2017-5005?
CVE-2017-5005 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-5005?
Check the references section above for vendor advisories and patch information. Affected products include: Quickheal Antivirus Pro, Quickheal Internet Security, Quickheal Total Security.