{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1364","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-02-16T08:47:58.767Z","datePublished":"2025-02-16T23:00:14.667Z","dateUpdated":"2025-02-18T16:07:31.878Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-02-16T23:00:14.667Z"},"title":"MicroWord eScan Antivirus USB Protection Service passPrompt stack-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-121","lang":"en","description":"Stack-based Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"MicroWord","product":"eScan Antivirus","versions":[{"version":"7.0.32","status":"affected"}],"modules":["USB Protection Service"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this vulnerability is the function passPrompt of the component USB Protection Service. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In MicroWord eScan Antivirus 7.0.32 für Linux wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es die Funktion passPrompt der Komponente USB Protection Service. Durch die Manipulation mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-02-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-02-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-02-16T09:53:02.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"FPT IS Security (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.295969","name":"VDB-295969 | MicroWord eScan Antivirus USB Protection Service passPrompt stack-based overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.295969","name":"VDB-295969 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.496481","name":"Submit #496481 | MicroWord Escan Antivirus For Linux 7.0.32 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-18T16:06:58.363831Z","id":"CVE-2025-1364","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-18T16:07:31.878Z"}}]}}