Vulnerability CVE-2007-0333


Published: 2007-01-17   Modified: 2012-02-12

Description:
Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys.

See advisories in our WLB2 database:
Topic
Author
Date
High
Outpost Bypassing Self-Protection using file links Vulnerability
Matousec - Trans...
22.01.2007

Type:

CWE-Other

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Agnitum -> Outpost firewall 

 References:
http://securityreason.com/securityalert/2163
http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php
http://www.securityfocus.com/archive/1/456973/100/0/threaded
http://www.securityfocus.com/bid/22069
https://exchange.xforce.ibmcloud.com/vulnerabilities/31529

Copyright 2024, cxsecurity.com

 

Back to Top