Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
References
Link | Resource |
---|---|
http://www.security.org.sg/vuln/kerio4016.html | Vendor Advisory |
http://secunia.com/advisories/12468/ | Vendor Advisory |
http://www.securityfocus.com/bid/11096 | Exploit Vendor Advisory |
http://marc.info/?l=bugtraq&m=109420310631039&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17270 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-09-01 21:00
Updated : 2017-07-10 18:31
NVD link : CVE-2004-1658
Mitre link : CVE-2004-1658
JSON object : View
CWE
Products Affected
kerio
- personal_firewall