Kerio Personal Firewall Hooked Functions Denial of Service
[B]Kerio Personal Firewall Hooked Functions Denial of Service[/B]
[url=http://secunia.com/advisories/22234/][I]Secunia Advisory: SA22234 Release Date: 2006-10-02[/I][/url]
[B]Critical:[/B] Not critical
[B]Impact:[/B] DoS
[B]Where:[/B] Local system
[B]Solution Status:[/B] Unpatched
[B]Software:[/B] Kerio Personal Firewall 4.x
[B]Description:[/B]
David Matousek has reported some vulnerabilities in Kerio Personal Firewall, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
The vulnerabilities are caused due to errors within fwdrv.sys and khips.sys when handling the parameters of certain hooked functions. This can be exploited to cause a DoS by calling NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile with specially crafted parameters.
The vulnerability has been reported in Kerio Personal Firewall 4.3.268, 4.3.246, 4.2.3.912. Other versions may also be affected.
[B]Solution:[/B] Restrict access to trusted users only.
Provided and/or discovered by: David Matousek
Original Advisory: [url]http://www.matousec.com/info/advisori...lidation-of-hooked-SSDT-functions.php[/url]