Computer Security
[EN] securityvulns.ru no-pyccku


Comodo firewall protection bypass
Published:15.02.2007
Source:
SecurityVulns ID:7243
Type:local
Threat Level:
4/10
Description:CRC32 control checksum is used for files protection making in trivial to bypass it.
Affected:COMODO : Comodo Firewall Pro 2.4
 COMODO : Comodo Personal Firewall 2.3
CVE:CVE-2007-1051 (Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value.)
Original documentdocumentMatousec - Transparent security Research, [Full-disclosure] Comodo DLL injection via weak hash function exploitation Vulnerability (15.02.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod