Kaspersky Antivirus DEX File Format Parsing Memory Corruption
https://packetstormsecurity.com/files/133944/GS20151013155528.tgz
https://packetstormsecurity.com/files/133944/GS20151013155528.tgzhttps://packetstormsecurity.com/files/133944/Kaspersky-Antivirus-DEX-File-Format-Parsing-Memory-Corruption.htmlTue, 13 Oct 2015 14:44:44 GMTFuzzing the DEX file format found a crash that loads a function pointer from an attacker controlled pointer, on Windows this results in a call to an unmapped address. This is obviously exploitable for remote, zero-interaction code execution as NT AUTHORITY\SYSTEM on any system with Kaspersky Antivirus.