K7 Total Security Privilege Escalation Vulnerability Feb15 (Windows)

Summary
The host is installed with K7 Total Security and is prone to privilege escalation vulnerability.
Impact
Successful exploitation will allow a local attacker to write controlled data to any memory location and execute code with kernel-level privileges. Impact Level: System
Solution
Upgrade to K7 Total Security version 14.2.0.253 or later, For updates refer to http://www.k7computing.co.uk/
Insight
The flaw is due to a write-what-where flaw in K7Sentry.sys in K7 Computing products that is triggered when handling certain IOCTL calls.
Affected
K7 Total Security before 14.2.0.253 on Windows.
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References