Vulnerability CVE-2006-6618


Published: 2006-12-18   Modified: 2012-02-12

Description:
AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.

Type:

CWE-Other

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Symantec -> Sygate personal firewall 
Soft4ever -> Look n stop 
Infoprocess -> Antihook 
Filseclab -> Personal firewall 
Comodo -> Comodo personal firewall 
AVG -> Antivirus plus firewall 

 References:
http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip
http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php
http://www.securityfocus.com/archive/1/454522/100/0/threaded
http://www.securityfocus.com/bid/21615

Copyright 2020, cxsecurity.com

 

Back to Top