Kerio Personal Firewall应用安全绕过漏洞

漏洞信息详情

Kerio Personal Firewall应用安全绕过漏洞

漏洞简介

Kerio Personal Firewall 4.0 (KPF4)存在漏洞。有管理权限的本地用户通过直接写到\device\physicalmemory恢复kernel\’\’s SDT ServiceTable的运行来绕过应用安全功能和执行任意进程。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: kerio-pf-protection-dos(17270)
链接:http://xforce.iss.net/xforce/xfdb/17270

来源: BID
名称: 11096
链接:http://www.securityfocus.com/bid/11096

来源: www.security.org.sg
链接:http://www.security.org.sg/vuln/kerio4016.html

来源: SECUNIA
名称: 12468
链接:http://secunia.com/advisories/12468/

来源: BUGTRAQ
名称: 20040902 Kerio Personal Firewall’s Application Launch Protection Can Be Disabled by Direct Service Table Restoration
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=109420310631039&w=2

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享