CVE-2006-7160
https://notcve.org/view.php?id=CVE-2006-7160
The Sandbox.sys driver in Outpost Firewall PRO 4.0, and possibly earlier versions, does not validate arguments to hooked SSDT functions, which allows local users to cause a denial of service (crash) via invalid arguments to the (1) NtAssignProcessToJobObject,, (2) NtCreateKey, (3) NtCreateThread, (4) NtDeleteFile, (5) NtLoadDriver, (6) NtOpenProcess, (7) NtProtectVirtualMemory, (8) NtReplaceKey, (9) NtTerminateProcess, (10) NtTerminateThread, (11) NtUnloadDriver, and (12) NtWriteVirtualMemory functions. El controlador Sandbox.sys de Outpost Firewall PRO versión 4.0, y posiblemente versiones anteriores, no comprueba argumentos para funciones SSDT enlazadas, permite a usuarios locales causar una denegación de servicio (bloqueo) mediante argumentos no válidos para las funciones (1) NtAssignProcessToJobObject, (2) NtCreateKey, (3) NtCreateThread, (4) NtDeleteFile, (5) NtLoadDriver, (6) NtOpenProcess, (7) NtProtectVirtualMemory, (8) NtReplaceKey, (9) NtTerminateProcess, (10) NtTerminateThread, (11) NtUnloadDriver y (12) NtWriteVirtualMemory. • http://secunia.com/advisories/22913 http://securityreason.com/securityalert/2376 http://www.matousec.com/info/advisories/Outpost-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php http://www.securityfocus.com/archive/1/451672/100/0/threaded http://www.securityfocus.com/bid/21097 http://www.vupen.com/english/advisories/2006/4537 https://exchange.xforce.ibmcloud.com/vulnerabilities/30312 • CWE-20: Improper Input Validation •
CVE-2006-3697
https://notcve.org/view.php?id=CVE-2006-3697
Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allows local users to gain privileges and execute commands (a) via the "open folder" option when no instance of explorer.exe is running, possibly related to the ShellExecute API function; or (b) by overwriting a batch file through the "Save Configuration As" option. NOTE: this might be a vulnerability in Microsoft Windows and explorer.exe instead of the firewall. Agnitum Outpost Firewall Pro 3.51.759.6511 (462), tal y como se usa en (1) Lavasoft Personal Firewall 1.0.543.5722 (433) y (2) Novell BorderManager Novell Client Firewall 2.0, no restringe de forma adecuada las actividades de usuario para ganar privilegios y ejecutar comandos (a)a través de la opción "abrir carpeta" cuando una instancia de explorer.exe está funcionando, posiblemente relacionado con la función API ShellExecute, o (b) a través de la re-escritura de un fichero de proceso por lotes a través de la opción "Guardar configuración como". NOTA: esto podría estar relacionado con la vulnerabilidad en Microsoft Windows y la instnacia explorer.exe del firewall. • http://secunia.com/advisories/21088 http://secunia.com/advisories/21089 http://www.ben.goulding.com.au/secad.html http://www.osvdb.org/27349 http://www.securityfocus.com/archive/1/440426/100/0/threaded http://www.securityfocus.com/bid/19018 http://www.securityfocus.com/bid/19024 http://www.vupen.com/english/advisories/2006/2851 http://www.vupen.com/english/advisories/2006/2852 http://www.vupen.com/english/advisories/2007/0144 https://secure-support.novell.com/K • CWE-264: Permissions, Privileges, and Access Controls •