Lucene search

K
vulnrichmentMitreVULNRICHMENT:CVE-2010-5160
HistoryOct 03, 2022 - 4:21 p.m.

CVE-2010-5160

2022-10-0316:21:02
mitre
github.com
eset smart security
windows xp
local users
kernel-mode hook handlers
dangerous code
signature-based malware detection
user-space memory changes
hook-handler execution
argument-switch attack
khobe attack

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

Race condition in ESET Smart Security 4.2.35.3 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

Related for VULNRICHMENT:CVE-2010-5160