AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip - | |
References | () http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/454522/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21615 - |
Information
Published : 2006-12-18 11:28
Updated : 2024-11-21 00:23
NVD link : CVE-2006-6618
Mitre link : CVE-2006-6618
CVE.ORG link : CVE-2006-6618
JSON object : View
Products Affected
symantec
- sygate_personal_firewall
soft4ever
- look_n_stop
infoprocess
- antihook
avg
- antivirus_plus_firewall
comodo
- comodo_personal_firewall
filseclab
- personal_firewall
CWE