1 results (0.001 seconds)

CVSS: 7.2EPSS: 0%CPEs: 16EXPL: 4

The OAmon.sys kernel driver 3.1.0.0 and earlier in Tall Emu Online Armor Personal Firewall AV+ before 3.5.0.12, and Personal Firewall 3.5 before 3.5.0.14, allows local users to gain privileges via crafted METHOD_NEITHER IOCTL requests to \Device\OAmon containing arbitrary kernel addresses, as demonstrated using the 0x830020C3 IOCTL. El controlador del kernel OAmon.sys v 3.1.0.0 y anteriores en Tall Emu Online Armor Personal Firewall AV+ anterior a v3.5.0.12, y Personal Firewall 3.5 anterior a v3.5.0.14, permite a usuarios locales obtener privilegios a través de peticiones METHOD_NEITHER IOCTL modificadas a \Device\OAmon que contienen direcciones del kernel de su elección como se ha demostrado empleadon el IOCTL 0x830020C3. • https://www.exploit-db.com/exploits/8875 http://milw0rm.com/sploits/2009-OAmon_Exp.zip http://www.exploit-db.com/exploits/8875 http://www.ntinternals.org/ntiadv0806/ntiadv0806.html http://www.securityfocus.com/bid/35227 https://exchange.xforce.ibmcloud.com/vulnerabilities/50960 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •