Soft4Ever Look 'n' Stop (LnS) 2.05p2 before 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip - | |
References | () http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php - | |
References | () http://www.securityfocus.com/archive/1/454522/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21615 - | |
References | () http://www.wilderssecurity.com/showthread.php?t=158155 - Vendor Advisory |
Information
Published : 2006-12-18 11:28
Updated : 2024-11-21 00:23
NVD link : CVE-2006-6622
Mitre link : CVE-2006-6622
CVE.ORG link : CVE-2006-6622
JSON object : View
Products Affected
soft4ever
- look_n_stop
comodo
- comodo_personal_firewall
filseclab
- personal_firewall
symantec
- sygate_personal_firewall
infoprocess
- antihook
avg
- antivirus_plus_firewall
CWE