Description ============ The vulnerability affects Kaspersky Internet Security 2010 antivirus and its brother, the Kaspersky Antivirus 2010 version. The exploit was discovered on August 18th 2009. The problem with these two antivirus versions appears when parsing a URL address. Using a lot of consecutive dots inside the address.Kaspersky's native avp.exe process will soar CPU usage up to 100%. At first, traffic via the browser will get blocked, and eventually, if enough consecutive dots have been passed inside the URL address, the computer will crash. This exploit can be used inside HTML files, as normal href values or as img image sources. It will also work inside HTML email bodies. The code can be used remotely, and will lead to a Remote Memory Corruption/Denial-of-Service that could alter computer hardware or software. Tested on Products ================= Kaspersky Internet Security 2010 (EN) with Mozilla FireFox in Windows XP Professional SP2 [en-US] Kaspersky Anti-Virus 2010 [En] with IE8 in Windows XP Professional SP2 [en-US] I have not tested it in Windows Vista/7 but it will work fine. Proof of Concept ================ The following HTML code can cause memory corruption then crash in avp.exe and running browser remotely :- Kaspersky 2010 DoS/Remote Memory Corruption Watch your native Kaspersky avp.exe Process in Task Manager. Greetings ============= str0ke Maksymilian Arciemowicz (for reporting the vulnerability)