Vulnerability: NOD32 antivirus software for Unix

iDEFENSE Labs reports that Eset Software's NOD32 Antivirus System has a local exploitation of a buffer overflow in NOD32 for UNIX that could allow attackers to "gain super-user (root) privileges. The overflow occurs when NOD32 parses a path with a name of length greater than 500 characters (/tmp/AAAAA....AAA)."

NOD32 runs on Linux, FreeBSD, OpenBSD and NetBSD. More info can be found here.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about iDefenseOpenBSDTMP

Show Comments