Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value.
References
Configurations
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html - | |
References | () http://osvdb.org/45243 - | |
References | () http://securityreason.com/securityalert/2279 - | |
References | () http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php - | |
References | () http://www.securityfocus.com/archive/1/460209/100/100/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32530 - |
Information
Published : 2007-02-21 23:28
Updated : 2024-11-21 00:27
NVD link : CVE-2007-1051
Mitre link : CVE-2007-1051
CVE.ORG link : CVE-2007-1051
JSON object : View
Products Affected
comodo
- comodo_firewall_pro
CWE