AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-12-18 03:28
Updated : 2018-10-17 14:49
NVD link : CVE-2006-6618
Mitre link : CVE-2006-6618
JSON object : View
CWE
Products Affected
comodo
- comodo_personal_firewall
infoprocess
- antihook
filseclab
- personal_firewall
soft4ever
- look_n_stop
symantec
- sygate_personal_firewall
avg
- antivirus_plus_firewall