Computer Security
[EN] securityvulns.ru no-pyccku


Comodo Firewall Pro privilege escalation
Published:01.02.2007
Source:
SecurityVulns ID:7139
Type:local
Threat Level:
5/10
Description:Insufficient filtering of hooked SSDT functions potentially allows code execution in system content.
Affected:COMODO : Comodo Firewall Pro 2.4
CVE:CVE-2007-0709 (cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.16.174 and earlier does not validate arguments that originate in user mode for the (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, and (5) NtSetValueKey hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments.)
 CVE-2007-0708 (cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) before 2.4.16.174 does not validate arguments that originate in user mode for the (1) NtConnectPort and (2) NtCreatePort hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments.)
Original documentdocumentMatousec - Transparent security Research, [Full-disclosure] Comodo Multiple insufficient argument validation of hooked SSDT function Vulnerability (01.02.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod