Kerio Personal Firewall (KPF) 2.1.5 allows local users to execute arbitrary code with SYSTEM privileges via the Load button in the Firewall Configuration Files option, which does not drop privileges before opening the file loading dialog box.
References
Configurations
History
20 Nov 2024, 23:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/10746/ - Vendor Advisory | |
References | () http://www.osvdb.org/3748 - | |
References | () http://www.securityfocus.com/bid/9525 - | |
References | () http://www.securitytracker.com/alerts/2004/Jan/1008870.html - Exploit | |
References | () http://www.tuneld.com/_images/other/kpf_system_privileges.png - | |
References | () http://www.tuneld.com/news/?id=30 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/14981 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:53
NVD link : CVE-2004-2329
Mitre link : CVE-2004-2329
CVE.ORG link : CVE-2004-2329
JSON object : View
Products Affected
kerio
- personal_firewall
CWE