All the vulnerabilites related to comodo - comodo_firewall_pro
Vulnerability from fkie_nvd
Published
2007-05-16 22:30
Modified
2024-11-21 00:31
Severity ?
Summary
Comodo Firewall Pro 2.4.18.184 and Comodo Personal Firewall 2.3.6.81, and probably older Comodo Firewall versions, do not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_firewall_pro | 2.4.18.184 | |
comodo | comodo_personal_firewall | 2.3.6.81 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_firewall_pro:2.4.18.184:*:*:*:*:*:*:*", "matchCriteriaId": "6518A7E2-C299-4985-BCAD-0A52FB9E850D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_personal_firewall:2.3.6.81:*:*:*:*:*:*:*", "matchCriteriaId": "27A1D441-3366-4F5C-944B-76472ACCBC29", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Comodo Firewall Pro 2.4.18.184 and Comodo Personal Firewall 2.3.6.81, and probably older Comodo Firewall versions, do not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier." }, { "lang": "es", "value": "Comodo Firewall Pro 2.4.18.184 y Comodo Personal Firewall 2.3.6.81, y posiblemente versiones anteriores de Comodo Firewall, no comprueba adecuadamente la equivalencia de identificadores de proceso para ciertas funciones de la API de Windows en el NT kernel 5.0 y superiores, lo cual permite a usuarios locales llamar a estas funciones, y evitar reglas del cortafuegos u obtener privilegios, mediante un identificador modificado que es una, dos o tres veces m\u00e1s grande que el identificador can\u00f3nico." } ], "id": "CVE-2007-2729", "lastModified": "2024-11-21T00:31:30.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-16T22:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/37375" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2714" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/37375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-07 21:19
Modified
2024-11-21 00:28
Severity ?
Summary
Comodo Firewall Pro (CFP) (formerly Comodo Personal Firewall) 2.4.18.184 and earlier allows local users to bypass driver protections on the HKLM\SYSTEM\Software\Comodo\Personal Firewall registry key by guessing the name of a named pipe under \Device\NamedPipe\OLE and attempting to open it multiple times.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_firewall_pro | 2.4.16.174 | |
comodo | comodo_firewall_pro | 2.4.17.183 | |
comodo | comodo_firewall_pro | 2.4.18.184 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_firewall_pro:2.4.16.174:*:*:*:*:*:*:*", "matchCriteriaId": "5E5BB621-8FCF-47E0-8724-D3FC940FC312", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_firewall_pro:2.4.17.183:*:*:*:*:*:*:*", "matchCriteriaId": "C0F19574-1A12-4C96-B1DE-C63233C6A13D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_firewall_pro:2.4.18.184:*:*:*:*:*:*:*", "matchCriteriaId": "6518A7E2-C299-4985-BCAD-0A52FB9E850D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Comodo Firewall Pro (CFP) (formerly Comodo Personal Firewall) 2.4.18.184 and earlier allows local users to bypass driver protections on the HKLM\\SYSTEM\\Software\\Comodo\\Personal Firewall registry key by guessing the name of a named pipe under \\Device\\NamedPipe\\OLE and attempting to open it multiple times." }, { "lang": "es", "value": "Comodo Firewall Pro (CFP) (antes conocido como Comodo Personal Firewall) 2.4.18.184 y versiones anteriores permite a usuarios locales evitar las protecciones del dispositivos en la clave de registro del HKLM\\SYSTEM\\Software\\Comodo\\Personal Firewall mediante la adivinaci\u00f3n del nombre de una tuber\u00eda con nombre bajo el \\Device\\NamedPipe\\OLE e intentando abrirlo en m\u00faltiples ocasiones." } ], "id": "CVE-2007-1330", "lastModified": "2024-11-21T00:28:02.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-07T21:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/34957" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2388" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/461635/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22775" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/34957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/461635/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32771" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-04 00:28
Modified
2024-11-21 00:26
Severity ?
Summary
cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.16.174 and earlier does not validate arguments that originate in user mode for the (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, and (5) NtSetValueKey hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_firewall_pro | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_firewall_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "24D1532A-7E34-4C8A-A8EF-856E5020C39D", "versionEndIncluding": "2.4.16.174", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.16.174 and earlier does not validate arguments that originate in user mode for the (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, and (5) NtSetValueKey hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments." }, { "lang": "es", "value": "cmdmon.sys en Comodo Firewall Pro (anteriormente Comodo Personal Firewall) 2.4.16.174 y versiones anteriores no valida argumentos que se originan el el modo usuario para las funciones (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, y (5) NtSetValueKey hooked SSDT, que permite a atacantes locales provocar una denegaci\u00f3n de servicio (ca\u00edda del sistema) y posiblemente obtener privilegios mediante argumentos inv\u00e1lidos." } ], "id": "CVE-2007-0709", "lastModified": "2024-11-21T00:26:32.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-04T00:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017580" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22357" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-16 22:30
Modified
2024-11-21 00:31
Severity ?
Summary
Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows_2000 | * | |
microsoft | windows_2003_server | * | |
microsoft | windows_xp | * | |
checkpoint | zonealarm | * | |
comodo | comodo_firewall_pro | 2.4.18.184 | |
comodo | comodo_personal_firewall | 2.3.6.81 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "60EC86B8-5C8C-4873-B364-FB1F8EFE1CFF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*", "matchCriteriaId": "E61F1C9B-44AF-4B35-A7B2-948EEF7639BD", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:checkpoint:zonealarm:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C7FDE10-07B9-4F86-8419-9F459B1DDD02", "versionEndIncluding": "6.1.744.001", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_firewall_pro:2.4.18.184:*:*:*:*:*:*:*", "matchCriteriaId": "6518A7E2-C299-4985-BCAD-0A52FB9E850D", "vulnerable": true }, { "criteria": "cpe:2.3:a:comodo:comodo_personal_firewall:2.3.6.81:*:*:*:*:*:*:*", "matchCriteriaId": "27A1D441-3366-4F5C-944B-76472ACCBC29", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier." }, { "lang": "es", "value": "Check Point Zonealarm Pro anterior a 6.5.737.000 no comprueba adecuadamente la equivalencia de identificadores de proceso para determinadas funciones de la API de Windows en el n\u00facleo de NT5.0 y superiores, lo cual permite a usuarios locales llamar a estas funciones y evitar reglas del cortafuegos u obtener privilegios, mediante un identificador modificado que es uno, dos, o tres unidades mayor que el identificador can\u00f3nico." } ], "evaluatorSolution": "ZoneAlarm Pro 6.5.737.000 and higher are not vulnerable.", "id": "CVE-2007-2730", "lastModified": "2024-11-21T00:31:30.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-16T22:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/37383" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2714" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/37383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-21 23:28
Modified
2024-11-21 00:27
Severity ?
Summary
Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_firewall_pro | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_firewall_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED05AF93-A193-4402-9783-A9D1CEE5F5DD", "versionEndIncluding": "2.4.17.183", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value." }, { "lang": "es", "value": "Comodo Firewall Pro (antes llamado Comodo Personal Firewall) 2.4.17.183 y versiones anteriores utiliza una funci\u00f3n hash criptogr\u00e1fica (CRC32) d\u00e9bil para identificar m\u00f3dulos de confianza, lo cual permite a usuarios locales evitar protecciones de seguridad sustituyendo m\u00f3dulos modificados que tienen el mismo valor CRC32." } ], "id": "CVE-2007-1051", "lastModified": "2024-11-21T00:27:23.313", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-21T23:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/45243" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2279" }, { "source": "cve@mitre.org", "url": "http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/460209/100/100/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/45243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/460209/100/100/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32530" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-04 00:28
Modified
2024-11-21 00:26
Severity ?
Summary
cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) before 2.4.16.174 does not validate arguments that originate in user mode for the (1) NtConnectPort and (2) NtCreatePort hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
comodo | comodo_firewall_pro | 2.4.16.174 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:comodo:comodo_firewall_pro:2.4.16.174:*:*:*:*:*:*:*", "matchCriteriaId": "5E5BB621-8FCF-47E0-8724-D3FC940FC312", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) before 2.4.16.174 does not validate arguments that originate in user mode for the (1) NtConnectPort and (2) NtCreatePort hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments." }, { "lang": "es", "value": "cmdmon.sys en Comodo Firewall Pro (formalmente Comodo Personal Firewall) anterior a 2.4.16.174 no valida los argumentos que se origina en modo usuario para las funciones enganchadas (1) NtConnectPort y (2) NtCreatePort SSDT, lo cual permite a un usuario local provocar denegaci\u00f3n de servicio (caida de sistema) y posiblemente ganar privilegios a trav\u00e9s de argumentos no v\u00e1lidos." } ], "id": "CVE-2007-0708", "lastModified": "2024-11-21T00:26:32.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-04T00:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017580" }, { "source": "cve@mitre.org", "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22357" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2007-1051
Vulnerability from cvelistv5
Published
2007-02-21 23:00
Modified
2024-08-07 12:43
Severity ?
EPSS score ?
Summary
Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/2279 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/460209/100/100/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://osvdb.org/45243 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32530 | vdb-entry, x_refsource_XF | |
http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php | x_refsource_MISC | |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:43:22.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2279", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2279" }, { "name": "20070215 Comodo DLL injection via weak hash function exploitation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/460209/100/100/threaded" }, { "name": "45243", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/45243" }, { "name": "comodofirewallpro-crc32-security-bypass(32530)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32530" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php" }, { "name": "20070215 Comodo DLL injection via weak hash function exploitation Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2279", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2279" }, { "name": "20070215 Comodo DLL injection via weak hash function exploitation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/460209/100/100/threaded" }, { "name": "45243", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/45243" }, { "name": "comodofirewallpro-crc32-security-bypass(32530)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32530" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php" }, { "name": "20070215 Comodo DLL injection via weak hash function exploitation Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2279", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2279" }, { "name": "20070215 Comodo DLL injection via weak hash function exploitation Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/460209/100/100/threaded" }, { "name": "45243", "refsource": "OSVDB", "url": "http://osvdb.org/45243" }, { "name": "comodofirewallpro-crc32-security-bypass(32530)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32530" }, { "name": "http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php" }, { "name": "20070215 Comodo DLL injection via weak hash function exploitation Vulnerability", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1051", "datePublished": "2007-02-21T23:00:00", "dateReserved": "2007-02-21T00:00:00", "dateUpdated": "2024-08-07T12:43:22.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0708
Vulnerability from cvelistv5
Published
2007-02-04 00:00
Modified
2024-08-07 12:26
Severity ?
EPSS score ?
Summary
cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) before 2.4.16.174 does not validate arguments that originate in user mode for the (1) NtConnectPort and (2) NtCreatePort hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/32059 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/22357 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/458773/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1017580 | vdb-entry, x_refsource_SECTRACK | |
http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:26:54.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "comodofirewallpro-cmdmon-dos(32059)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" }, { "name": "22357", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22357" }, { "name": "20070201 Comodo Multiple insufficient argument validation of hooked SSDT function Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "name": "1017580", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017580" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) before 2.4.16.174 does not validate arguments that originate in user mode for the (1) NtConnectPort and (2) NtCreatePort hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "comodofirewallpro-cmdmon-dos(32059)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" }, { "name": "22357", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22357" }, { "name": "20070201 Comodo Multiple insufficient argument validation of hooked SSDT function Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "name": "1017580", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017580" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0708", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) before 2.4.16.174 does not validate arguments that originate in user mode for the (1) NtConnectPort and (2) NtCreatePort hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "comodofirewallpro-cmdmon-dos(32059)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" }, { "name": "22357", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22357" }, { "name": "20070201 Comodo Multiple insufficient argument validation of hooked SSDT function Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "name": "1017580", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017580" }, { "name": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0708", "datePublished": "2007-02-04T00:00:00", "dateReserved": "2007-02-03T00:00:00", "dateUpdated": "2024-08-07T12:26:54.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2730
Vulnerability from cvelistv5
Published
2007-05-16 22:00
Modified
2024-08-07 13:49
Severity ?
EPSS score ?
Summary
Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/2714 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/468643/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://osvdb.org/37383 | vdb-entry, x_refsource_OSVDB | |
http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:49:57.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2714", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2714" }, { "name": "20070515 Bypassing PFW/HIPS open process control with uncommon identifier", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" }, { "name": "37383", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37383" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2714", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2714" }, { "name": "20070515 Bypassing PFW/HIPS open process control with uncommon identifier", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" }, { "name": "37383", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37383" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2730", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2714", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2714" }, { "name": "20070515 Bypassing PFW/HIPS open process control with uncommon identifier", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" }, { "name": "37383", "refsource": "OSVDB", "url": "http://osvdb.org/37383" }, { "name": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2730", "datePublished": "2007-05-16T22:00:00", "dateReserved": "2007-05-16T00:00:00", "dateUpdated": "2024-08-07T13:49:57.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0709
Vulnerability from cvelistv5
Published
2007-02-04 00:00
Modified
2024-08-07 12:26
Severity ?
EPSS score ?
Summary
cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.16.174 and earlier does not validate arguments that originate in user mode for the (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, and (5) NtSetValueKey hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/32059 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/22357 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/458773/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1017580 | vdb-entry, x_refsource_SECTRACK | |
http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:26:54.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "comodofirewallpro-cmdmon-dos(32059)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" }, { "name": "22357", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22357" }, { "name": "20070201 Comodo Multiple insufficient argument validation of hooked SSDT function Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "name": "1017580", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017580" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.16.174 and earlier does not validate arguments that originate in user mode for the (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, and (5) NtSetValueKey hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "comodofirewallpro-cmdmon-dos(32059)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" }, { "name": "22357", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22357" }, { "name": "20070201 Comodo Multiple insufficient argument validation of hooked SSDT function Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "name": "1017580", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017580" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0709", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.16.174 and earlier does not validate arguments that originate in user mode for the (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, and (5) NtSetValueKey hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "comodofirewallpro-cmdmon-dos(32059)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32059" }, { "name": "22357", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22357" }, { "name": "20070201 Comodo Multiple insufficient argument validation of hooked SSDT function Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/458773/100/0/threaded" }, { "name": "1017580", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017580" }, { "name": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0709", "datePublished": "2007-02-04T00:00:00", "dateReserved": "2007-02-03T00:00:00", "dateUpdated": "2024-08-07T12:26:54.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2729
Vulnerability from cvelistv5
Published
2007-05-16 22:00
Modified
2024-08-07 13:49
Severity ?
EPSS score ?
Summary
Comodo Firewall Pro 2.4.18.184 and Comodo Personal Firewall 2.3.6.81, and probably older Comodo Firewall versions, do not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/2714 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/468643/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php | x_refsource_MISC | |
http://osvdb.org/37375 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:49:57.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2714", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2714" }, { "name": "20070515 Bypassing PFW/HIPS open process control with uncommon identifier", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" }, { "name": "37375", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37375" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Comodo Firewall Pro 2.4.18.184 and Comodo Personal Firewall 2.3.6.81, and probably older Comodo Firewall versions, do not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2714", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2714" }, { "name": "20070515 Bypassing PFW/HIPS open process control with uncommon identifier", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" }, { "name": "37375", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37375" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2729", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Comodo Firewall Pro 2.4.18.184 and Comodo Personal Firewall 2.3.6.81, and probably older Comodo Firewall versions, do not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2714", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2714" }, { "name": "20070515 Bypassing PFW/HIPS open process control with uncommon identifier", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/468643/100/0/threaded" }, { "name": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php" }, { "name": "37375", "refsource": "OSVDB", "url": "http://osvdb.org/37375" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2729", "datePublished": "2007-05-16T22:00:00", "dateReserved": "2007-05-16T00:00:00", "dateUpdated": "2024-08-07T13:49:57.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1330
Vulnerability from cvelistv5
Published
2007-03-07 21:00
Modified
2024-08-07 12:50
Severity ?
EPSS score ?
Summary
Comodo Firewall Pro (CFP) (formerly Comodo Personal Firewall) 2.4.18.184 and earlier allows local users to bypass driver protections on the HKLM\SYSTEM\Software\Comodo\Personal Firewall registry key by guessing the name of a named pipe under \Device\NamedPipe\OLE and attempting to open it multiple times.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/22775 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32771 | vdb-entry, x_refsource_XF | |
http://securityreason.com/securityalert/2388 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/461635/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php | x_refsource_MISC | |
http://osvdb.org/34957 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:50:35.114Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "22775", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22775" }, { "name": "comodofirewallpro-pipe-security-bypass(32771)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32771" }, { "name": "2388", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2388" }, { "name": "20070301 Comodo Bypassing settings protection using magic pipe Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/461635/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php" }, { "name": "34957", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34957" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Comodo Firewall Pro (CFP) (formerly Comodo Personal Firewall) 2.4.18.184 and earlier allows local users to bypass driver protections on the HKLM\\SYSTEM\\Software\\Comodo\\Personal Firewall registry key by guessing the name of a named pipe under \\Device\\NamedPipe\\OLE and attempting to open it multiple times." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "22775", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22775" }, { "name": "comodofirewallpro-pipe-security-bypass(32771)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32771" }, { "name": "2388", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2388" }, { "name": "20070301 Comodo Bypassing settings protection using magic pipe Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/461635/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php" }, { "name": "34957", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34957" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1330", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Comodo Firewall Pro (CFP) (formerly Comodo Personal Firewall) 2.4.18.184 and earlier allows local users to bypass driver protections on the HKLM\\SYSTEM\\Software\\Comodo\\Personal Firewall registry key by guessing the name of a named pipe under \\Device\\NamedPipe\\OLE and attempting to open it multiple times." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "22775", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22775" }, { "name": "comodofirewallpro-pipe-security-bypass(32771)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32771" }, { "name": "2388", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2388" }, { "name": "20070301 Comodo Bypassing settings protection using magic pipe Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/461635/100/0/threaded" }, { "name": "http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php" }, { "name": "34957", "refsource": "OSVDB", "url": "http://osvdb.org/34957" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1330", "datePublished": "2007-03-07T21:00:00", "dateReserved": "2007-03-07T00:00:00", "dateUpdated": "2024-08-07T12:50:35.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }