-
Kerio Personal Firewall Hooked Functions Denial of Service
Kerio Personal Firewall Hooked Functions Denial of Service
Secunia Advisory: SA22234 Release Date: 2006-10-02
Critical: Not critical
Impact: DoS
Where: Local system
Solution Status: Unpatched
Software: Kerio Personal Firewall 4.x
Description:
David Matousek has reported some vulnerabilities in Kerio Personal Firewall, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
The vulnerabilities are caused due to errors within fwdrv.sys and khips.sys when handling the parameters of certain hooked functions. This can be exploited to cause a DoS by calling NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile with specially crafted parameters.
The vulnerability has been reported in Kerio Personal Firewall 4.3.268, 4.3.246, 4.2.3.912. Other versions may also be affected.
Solution: Restrict access to trusted users only.
Provided and/or discovered by: David Matousek
Original Advisory: http://www.matousec.com/info/advisor...-functions.php
-
-
Будь в курсе!
Будь в курсе!
Надоело быть жертвой? Стань профи по информационной безопасности, получай самую свежую информацию об угрозах и средствах защиты от ведущего российского аналитического центра Anti-Malware.ru:
-
В Kerio используются технологии Tiny Firewall. К Tiny эта уязвимость тоже относится, интересно?
[I]Nick Golovko
NCFU lecturer, information security specialist[/I]