The OAmon.sys kernel driver 3.1.0.0 and earlier in Tall Emu Online Armor Personal Firewall AV+ before 3.5.0.12, and Personal Firewall 3.5 before 3.5.0.14, allows local users to gain privileges via crafted METHOD_NEITHER IOCTL requests to \Device\OAmon containing arbitrary kernel addresses, as demonstrated using the 0x830020C3 IOCTL.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://milw0rm.com/sploits/2009-OAmon_Exp.zip - Exploit | |
References | () http://www.exploit-db.com/exploits/8875 - | |
References | () http://www.ntinternals.org/ntiadv0806/ntiadv0806.html - | |
References | () http://www.securityfocus.com/bid/35227 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/50960 - |
Information
Published : 2009-07-13 17:30
Updated : 2024-11-21 01:04
NVD link : CVE-2009-2450
Mitre link : CVE-2009-2450
CVE.ORG link : CVE-2009-2450
JSON object : View
Products Affected
tallemu
- personal_firewall
- online_armor_personal_firewall_av\+
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer