Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.security.org.sg/vuln/kerio4016.html | Vendor Advisory | 
| http://secunia.com/advisories/12468/ | Vendor Advisory | 
| http://www.securityfocus.com/bid/11096 | Exploit Vendor Advisory | 
| http://marc.info/?l=bugtraq&m=109420310631039&w=2 | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/17270 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Information
                Published : 2004-09-01 21:00
Updated : 2017-07-10 18:31
NVD link : CVE-2004-1658
Mitre link : CVE-2004-1658
JSON object : View
CWE
                Products Affected
                kerio
- personal_firewall


