CVE-2007-0333

Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys.
Configurations

Configuration 1 (hide)

cpe:2.3:a:agnitum:outpost_firewall:4.0:*:pro:*:*:*:*:*

History

21 Nov 2024, 00:25

Type Values Removed Values Added
References () http://osvdb.org/33480 - () http://osvdb.org/33480 -
References () http://securityreason.com/securityalert/2163 - () http://securityreason.com/securityalert/2163 -
References () http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php - Vendor Advisory () http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php - Vendor Advisory
References () http://www.securityfocus.com/archive/1/456973/100/0/threaded - () http://www.securityfocus.com/archive/1/456973/100/0/threaded -
References () http://www.securityfocus.com/bid/22069 - Exploit () http://www.securityfocus.com/bid/22069 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/31529 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/31529 -

Information

Published : 2007-01-18 02:28

Updated : 2024-11-21 00:25


NVD link : CVE-2007-0333

Mitre link : CVE-2007-0333

CVE.ORG link : CVE-2007-0333


JSON object : View

Products Affected

agnitum

  • outpost_firewall