VYPR
Unrated severityNVD Advisory· Published Jan 26, 2025· Updated Feb 12, 2025

Microword eScan Antivirus Folder Watch List rtscanner removeExtraSlashes stack-based overflow

CVE-2025-0720

Description

A vulnerability was found in Microword eScan Antivirus 7.0.32 on Linux. It has been rated as problematic. Affected by this issue is the function removeExtraSlashes of the file /opt/MicroWorld/sbin/rtscanner of the component Folder Watch List Handler. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

2
  • MicroWord/eScan Antivirusllm-fuzzy2 versions
    = 7.0.32 (on Linux)+ 1 more
    • (no CPE)range: = 7.0.32 (on Linux)
    • (no CPE)range: 7.0.32

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.