CVE

CVE-2009-4215

Severity:
Pending analysis
Type:
CWE-264 Permissions, Privileges, and Access Control
Publication date:
07/12/2009
Last modified:
10/10/2018

Description

Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:32_bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:64-bit:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:32-bit:*:*:*:*:*
cpe:2.3:a:pandasecurity:panda_antivirus:2010:*:pro:*:*:*:*:*
cpe:2.3:a:pandasecurity:panda_global_protection:2010:*:*:*:*:*:*:*
cpe:2.3:a:pandasecurity:panda_internet_security:2010:*:pro:*:*:*:*:*