CVE-2007-1051

Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value.
Configurations

Configuration 1 (hide)

cpe:2.3:a:comodo:comodo_firewall_pro:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:27

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html -
References () http://osvdb.org/45243 - () http://osvdb.org/45243 -
References () http://securityreason.com/securityalert/2279 - () http://securityreason.com/securityalert/2279 -
References () http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php - () http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php -
References () http://www.securityfocus.com/archive/1/460209/100/100/threaded - () http://www.securityfocus.com/archive/1/460209/100/100/threaded -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/32530 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/32530 -

Information

Published : 2007-02-21 23:28

Updated : 2024-11-21 00:27


NVD link : CVE-2007-1051

Mitre link : CVE-2007-1051

CVE.ORG link : CVE-2007-1051


JSON object : View

Products Affected

comodo

  • comodo_firewall_pro