CVE-2006-5153

The (1) fwdrv.sys and (2) khips.sys drivers in Sunbelt Kerio Personal Firewall 4.3.268 and earlier do not validate arguments passed through to SSDT functions, including NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile, which allows local users to cause a denial of service (crash) and possibly other impacts via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kerio:personal_firewall:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.12:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.14:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.15:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.1:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.2:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.3.246:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.3.268:*:*:*:*:*:*:*

History

21 Nov 2024, 00:18

Type Values Removed Values Added
References () http://secunia.com/advisories/22234 - Vendor Advisory () http://secunia.com/advisories/22234 - Vendor Advisory
References () http://securityreason.com/securityalert/1685 - () http://securityreason.com/securityalert/1685 -
References () http://securitytracker.com/id?1016967 - () http://securitytracker.com/id?1016967 -
References () http://www.matousec.com/info/advisories/Kerio-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php - Exploit, Vendor Advisory () http://www.matousec.com/info/advisories/Kerio-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php - Exploit, Vendor Advisory
References () http://www.securityfocus.com/archive/1/447504/100/0/threaded - () http://www.securityfocus.com/archive/1/447504/100/0/threaded -
References () http://www.securityfocus.com/bid/20299 - Exploit () http://www.securityfocus.com/bid/20299 - Exploit
References () http://www.vupen.com/english/advisories/2006/3872 - () http://www.vupen.com/english/advisories/2006/3872 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29313 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29313 -

Information

Published : 2006-10-05 04:04

Updated : 2024-11-21 00:18


NVD link : CVE-2006-5153

Mitre link : CVE-2006-5153

CVE.ORG link : CVE-2006-5153


JSON object : View

Products Affected

kerio

  • personal_firewall