Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=109420310631039&w=2 | |
http://secunia.com/advisories/12468/ | Vendor Advisory |
http://www.security.org.sg/vuln/kerio4016.html | Vendor Advisory |
http://www.securityfocus.com/bid/11096 | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17270 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2004-09-02 04:00
Updated : 2024-02-28 10:24
NVD link : CVE-2004-1658
Mitre link : CVE-2004-1658
CVE.ORG link : CVE-2004-1658
JSON object : View
Products Affected
kerio
- personal_firewall
CWE