CVE-2007-1330 – Comodo Firewall Pro 2.4.x - Local Protection Mechanism Bypass
https://notcve.org/view.php?id=CVE-2007-1330
Comodo Firewall Pro (CFP) (formerly Comodo Personal Firewall) 2.4.18.184 and earlier allows local users to bypass driver protections on the HKLM\SYSTEM\Software\Comodo\Personal Firewall registry key by guessing the name of a named pipe under \Device\NamedPipe\OLE and attempting to open it multiple times. Comodo Firewall Pro (CFP) (antes conocido como Comodo Personal Firewall) 2.4.18.184 y versiones anteriores permite a usuarios locales evitar las protecciones del dispositivos en la clave de registro del HKLM\SYSTEM\Software\Comodo\Personal Firewall mediante la adivinación del nombre de una tubería con nombre bajo el \Device\NamedPipe\OLE e intentando abrirlo en múltiples ocasiones. • https://www.exploit-db.com/exploits/29695 http://osvdb.org/34957 http://securityreason.com/securityalert/2388 http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php http://www.securityfocus.com/archive/1/461635/100/0/threaded http://www.securityfocus.com/bid/22775 https://exchange.xforce.ibmcloud.com/vulnerabilities/32771 •
CVE-2007-1051
https://notcve.org/view.php?id=CVE-2007-1051
Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value. Comodo Firewall Pro (antes llamado Comodo Personal Firewall) 2.4.17.183 y versiones anteriores utiliza una función hash criptográfica (CRC32) débil para identificar módulos de confianza, lo cual permite a usuarios locales evitar protecciones de seguridad sustituyendo módulos modificados que tienen el mismo valor CRC32. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html http://osvdb.org/45243 http://securityreason.com/securityalert/2279 http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php http://www.securityfocus.com/archive/1/460209/100/100/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/32530 •
CVE-2007-0708 – Comodo Firewall 2.3.6 - 'CMDMon.SYS' Multiple Denial of Service Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-0708
cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) before 2.4.16.174 does not validate arguments that originate in user mode for the (1) NtConnectPort and (2) NtCreatePort hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments. cmdmon.sys en Comodo Firewall Pro (formalmente Comodo Personal Firewall) anterior a 2.4.16.174 no valida los argumentos que se origina en modo usuario para las funciones enganchadas (1) NtConnectPort y (2) NtCreatePort SSDT, lo cual permite a un usuario local provocar denegación de servicio (caida de sistema) y posiblemente ganar privilegios a través de argumentos no válidos. • https://www.exploit-db.com/exploits/29558 http://securitytracker.com/id?1017580 http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php http://www.securityfocus.com/archive/1/458773/100/0/threaded http://www.securityfocus.com/bid/22357 https://exchange.xforce.ibmcloud.com/vulnerabilities/32059 •
CVE-2007-0709
https://notcve.org/view.php?id=CVE-2007-0709
cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.16.174 and earlier does not validate arguments that originate in user mode for the (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, and (5) NtSetValueKey hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments. cmdmon.sys en Comodo Firewall Pro (anteriormente Comodo Personal Firewall) 2.4.16.174 y versiones anteriores no valida argumentos que se originan el el modo usuario para las funciones (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, y (5) NtSetValueKey hooked SSDT, que permite a atacantes locales provocar una denegación de servicio (caída del sistema) y posiblemente obtener privilegios mediante argumentos inválidos. • http://securitytracker.com/id?1017580 http://www.matousec.com/info/advisories/Comodo-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php http://www.securityfocus.com/archive/1/458773/100/0/threaded http://www.securityfocus.com/bid/22357 https://exchange.xforce.ibmcloud.com/vulnerabilities/32059 •
CVE-2006-6619 – Multiple Vendor Firewall - HIPS Process Spoofing
https://notcve.org/view.php?id=CVE-2006-6619
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. AVG Anti-Virus plus Firewall 7.5.431 depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el proceso mediante la simulación de los campos (1) ImagePathName, (2) CommandLine y(3) WindowTitle en el PEB • https://www.exploit-db.com/exploits/29287 http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip http://www.matousec.com/info/advisories/Bypassing-process-identification-serveral-personal-firewalls-HIPS.php http://www.securityfocus.com/archive/1/454522/100/0/threaded http://www.securityfocus.com/bid/21615 •