

Furthermore, exploitation can only succeed when Self-Defense is disabled. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop.Ī local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions.

#ESET CYBER SECURITY PRO 6.X WITH UPDATED MODULES DOWNLOAD ARCHIVE#
Use-after-free in eset_rtp kernel module used in ESET products for Linux allows potential attacker to trigger denial-of-service condition on the system.ĮSET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.ĮSET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot.ĮSET Archive Support Module before 1296 allows virus-detection bypass via a crafted Compression Information Field in a ZIP archive.
