Failed updating etrust vet engine
The crash occurs when the driver performs a memset operation which uses a size beyond the size of buffer specified, causing kernel crash. This section object is exposed by Cmd Agent and contains a Shared Memory Dictionary object, which allows a low privileged process to modify the object data causing Cmd to crash.
Comodo Antivirus versions up to 188.8.131.5210 are vulnerable to a local Denial of Service affecting Cmd via its LPC port "cmdvrt LPCServer Port".
Once this occurs, a specially crafted message can be sent to "cmd Service Port" using "Filter Send Message" API.
This can trigger an out-of-bounds write if lp Out Buffer parameter in Filter Send Message API is near the end of specified buffer bounds.
A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam Anti Virus (Clam AV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.
The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device.
A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version Clam AV Software.An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.This allows an attacker to cause a denial of service (BSOD) when an executable is run inside the container.Comodo Antivirus through 184.108.40.20670, Comodo Firewall through 220.127.116.1170, and Comodo Internet Security Premium through 18.104.22.16870, with the Comodo Container feature, are vulnerable to Sandbox Escape.