{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1368","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-02-16T08:52:27.004Z","datePublished":"2025-02-17T01:00:11.214Z","dateUpdated":"2025-02-18T19:33:13.700Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-02-17T01:00:11.214Z"},"title":"MicroWord eScan Antivirus mwav.conf ReadConfiguration buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"MicroWord","product":"eScan Antivirus","versions":[{"version":"7.0.32","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects the function ReadConfiguration of the file /opt/MicroWorld/etc/mwav.conf. The manipulation of the argument BasePath leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In MicroWord eScan Antivirus 7.0.32 für Linux wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Betroffen ist die Funktion ReadConfiguration der Datei /opt/MicroWorld/etc/mwav.conf. Mittels Manipulieren des Arguments BasePath mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.6,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.4,"vectorString":"AV:L/AC:L/Au:M/C:N/I:N/A:P"}}],"timeline":[{"time":"2025-02-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-02-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-02-16T09:57:31.000Z","lang":"en","value":"VulDB entry last update"}],"references":[{"url":"https://vuldb.com/?id.295972","name":"VDB-295972 | MicroWord eScan Antivirus mwav.conf ReadConfiguration buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.295972","name":"VDB-295972 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-18T18:50:53.958978Z","id":"CVE-2025-1368","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-18T19:33:13.700Z"}}]}}