Race condition in avast! Internet Security 5.0.462 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:21:02
Updated: 2022-10-03T16:21:02
Reserved: 2022-10-03T00:00:00
Link: CVE-2010-5151
JSON object: View
NVD Information
Status : Modified
Published: 2012-08-25T21:55:02.290
Modified: 2024-05-17T00:48:26.587
Link: CVE-2010-5151
JSON object: View
Redhat Information
No data.
CWE