Good news ! Hackbusters community is waiting for you !  https://discuss.hackbusters.com
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at: https://discuss.hackbusters.com.

Tough weekend for Kaspersky patching a buffer overflow vulnerability

Kaspersky-lab-internet-150x150
Last week, Kaspersky Lab was informed about a buffer overflow flaw that affects its antivirus products version 2015 and 2016 and released a patch within 24 hours.

Last week, Kaspersky Lab was informed about a buffer overflow flaw that affects its antivirus products version 2015 and 2016 by one of information security engineers working in Google and released a patch within 24 hours to address the problem.

Tavis Ormandy tweeted on 5th September about this exploit with a screenshot that shows windows calculator is running under the process of Kaspersky antivirus. A commonly used method to demonstrate successful code execution exploit is opening calc.exe from a difference process.

It simply means if an application contains a flaw that let an attacker execute calc.exe, the application can be used as a platform to execute any malicious code.

A representative of the Kaspersky Lab said the vulnerability was a buffer overflow and was patched within 24 hours after being reported....(continued)

View All Trending Stories