2 results (0.006 seconds)

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 1

Comodo Firewall Pro (CFP) (formerly Comodo Personal Firewall) 2.4.18.184 and earlier allows local users to bypass driver protections on the HKLM\SYSTEM\Software\Comodo\Personal Firewall registry key by guessing the name of a named pipe under \Device\NamedPipe\OLE and attempting to open it multiple times. Comodo Firewall Pro (CFP) (antes conocido como Comodo Personal Firewall) 2.4.18.184 y versiones anteriores permite a usuarios locales evitar las protecciones del dispositivos en la clave de registro del HKLM\SYSTEM\Software\Comodo\Personal Firewall mediante la adivinación del nombre de una tubería con nombre bajo el \Device\NamedPipe\OLE e intentando abrirlo en múltiples ocasiones. • https://www.exploit-db.com/exploits/29695 http://osvdb.org/34957 http://securityreason.com/securityalert/2388 http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php http://www.securityfocus.com/archive/1/461635/100/0/threaded http://www.securityfocus.com/bid/22775 https://exchange.xforce.ibmcloud.com/vulnerabilities/32771 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value. Comodo Firewall Pro (antes llamado Comodo Personal Firewall) 2.4.17.183 y versiones anteriores utiliza una función hash criptográfica (CRC32) débil para identificar módulos de confianza, lo cual permite a usuarios locales evitar protecciones de seguridad sustituyendo módulos modificados que tienen el mismo valor CRC32. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html http://osvdb.org/45243 http://securityreason.com/securityalert/2279 http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php http://www.securityfocus.com/archive/1/460209/100/100/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/32530 •