Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys.
References
Configurations
History
21 Nov 2024, 00:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/33480 - | |
References | () http://securityreason.com/securityalert/2163 - | |
References | () http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/456973/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/22069 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31529 - |
Information
Published : 2007-01-18 02:28
Updated : 2024-11-21 00:25
NVD link : CVE-2007-0333
Mitre link : CVE-2007-0333
CVE.ORG link : CVE-2007-0333
JSON object : View
Products Affected
agnitum
- outpost_firewall
CWE