Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=109420310631039&w=2 | |
http://secunia.com/advisories/12468/ | Vendor Advisory |
http://www.security.org.sg/vuln/kerio4016.html | Vendor Advisory |
http://www.securityfocus.com/bid/11096 | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17270 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2005-02-20T05:00:00
Updated: 2017-07-10T14:57:01
Reserved: 2005-02-21T00:00:00
Link: CVE-2004-1658
JSON object: View
NVD Information
Status : Modified
Published: 2004-09-02T04:00:00.000
Modified: 2017-07-11T01:31:13.967
Link: CVE-2004-1658
JSON object: View
Redhat Information
No data.
CWE