67660 : Multiple Security Product Argument Switch Race Condition Scan Bypass
Printer | http://osvdb.org/67660 | Email This | Edit Vulnerability

Views This Week Views All Time Added to OSVDB Last Modified Modified (since 2008) Percent Complete
1 1600 almost 4 years ago over 1 year ago 24 times 70%

This vulnerability has been flagged as being a Myth/Fake.

Timeline

Disclosure Date
2010-05-05

Description

Multiple security products have been reported to be vulnerable to an "argument switch" race condition issue, that may allow an attacker to bypass scanning activity or elevate privileges. The vulnerability is also known as a TOCTTOU (time-of-check-to-time-of-use) attack, relying on a weakness in the operating system for SSDT hooking activity. Several vendors have replied to this research pointing out that the 'attack' is extremely limited, and while interesting, poses no threat to the software. The vendors point out that the attack can only be implemented if the scanning software misses a piece of malware, allowing the malware to then bypass scanning, which it already did. Once the attack can be launched, it might be useful for hiding the presence of the malware, but malware writers have used much more reliable methods for many years. Finally, this attack works on Windows XP, and does not work on subsequent versions of Windows. In summary, this attack can only be launched to bypass the security software, if the software has already been bypassed.

Classification

Location: Local Access Required
Attack Type: Input Manipulation
Impact: Loss of Integrity
Exploit: Exploit Private
Disclosure: Vendor Verified, Third-party Disputed
OSVDB: Myth / Fake, Security Software

Solution

The reported vulnerability has been determined to be incorrect. No solution is required.

Products

Unknown or Incomplete

References

Credit

CVSSv2 Score

CVSSv2 Base Score = 6.2
Source: nvd.nist.gov | Generated: 2012-08-27 | Disagree? | There are 35 more: View All

Access_vector_0 Access_complexity_0 Authentication_2 Confidentiality_impact_2 Integrity_impact_2 Availability_impact_2

Comments

No Comments.

The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

© Copyright 2002 - 2014 Open Sourced Vulnerability Database (OSVDB), All Rights Reserved.
License - Privacy Statement - Terms of Use