leveraging the same access credentials and attack vector, an attacker could shut down the affected system without authorization.
oh shit. time to patch! On Wed, Nov 5, 2008 at 10:49 AM, alessandro telami <[EMAIL PROTECTED]> wrote: > What sort of vulnerability would this be??? > >> Date: Wed, 5 Nov 2008 08:52:28 +0000 >> From: [EMAIL PROTECTED] >> To: [email protected] >> Subject: [Full-disclosure] AVG 8.0.173 flaw >> >> AVG 8.0.173 flaw >> Nov 5, 2008 >> >> -- Affected Vendors: >> AVG Technologies >> >> -- Affected Products: >> AVG 8.0.173 >> >> -- Vulnerability Details: >> There is a flaw in AVG 8.0 that alow a user to shutdown the AVG >> Resident Shield Service via Task Manager temporarily and execute a >> malicious file while the AVG Resident Shield Service is restarting. >> >> Note: The AVG Resident Shield Service can be crashed, until next boot. >> >> -- Dificulty Level: >> low >> >> -- Vendor Response: >> None >> >> -- Disclosure Timeline: >> 2008-11-05 - Disclosure >> >> -- About: >> Fabio Pinheiro at http://dicas3000.blogspot.com >> >> _______________________________________________ >> Full-Disclosure - We believe in it. >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >> Hosted and sponsored by Secunia - http://secunia.com/ > > ________________________________ > Get the best wallpapers on the Web - FREE. Click here! > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
