Kerio Personal Firewall Hooked Functions Denial of Service
Secunia Advisory: SA22234 Release Date: 2006-10-02
Critical: Not critical
Where: Local system
Solution Status: Unpatched
Software: Kerio Personal Firewall 4.x
David Matousek has reported some vulnerabilities in Kerio Personal Firewall, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
The vulnerabilities are caused due to errors within fwdrv.sys and khips.sys when handling the parameters of certain hooked functions. This can be exploited to cause a DoS by calling NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile with specially crafted parameters.
The vulnerability has been reported in Kerio Personal Firewall 4.3.268, 4.3.246, 188.8.131.522. Other versions may also be affected.
Solution: Restrict access to trusted users only.
Provided and/or discovered by: David Matousek
Original Advisory: http://www.matousec.com/info/advisor...-functions.php