Multiple vulnerabilities in Zemana AntiLogger



Published: 2024-03-19
Risk Medium
Patch available NO
Number of vulnerabilities 2
CVE-ID CVE-2024-2180
CVE-2024-2204
CWE-ID CWE-119
CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
AntiLogger
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor Zemana

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU87619

Risk: Low

CVSSv3.1: 5.1 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2024-2180

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a boundary error in the zam64.sys and zamguard64.sys drivers. A local user can trigger the 0x80002020 IOCTL code and obtain sensitive information.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AntiLogger: 2.74.2.664

External links

http://fluidattacks.com/advisories/gomez/
http://zemana.com/us/antilogger.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU87620

Risk: Medium

CVSSv3.1: 5.1 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2024-2204

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the zam64.sys and zamguard64.sys drivers. A local user can trigger the 0x80002004 and 0x80002010 IOCTL codes and perform a denial of service (DoS) attack.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AntiLogger: 2.74.2.664

External links

http://fluidattacks.com/advisories/hassan/
http://zemana.com/us/antilogger.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###