CVE-2006-6952
Computer Associates Personal Firewall 9.0 - HIPS Driver 'kmxfw.sys' Local Privilege Escalation
Severity Score
7.2
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Computer Associates Host Intrusion Prevention System (HIPS) drivers (1) Core kmxstart.sys 6.5.4.31 and (2) Firewall kmxfw.sys 6.5.4.10 allow local users to gain privileges by using certain privileged IOCTLs to modify callback function pointers.
Los controladores del Computer Associates Host Intrusion Prevention System (HIPS) (1) Core kmxstart.sys 6.5.4.31 y (2) Firewall kmxfw.sys 6.5.4.10 permite a usuarios locales la obtención de privilegios mediante el uso de ciertos IOCTLs confidenciales para modificar los punteros a las llamadas a funciones.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2006-11-16 First Exploit
- 2007-01-24 CVE Reserved
- 2007-01-24 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://www.osvdb.org/30497 | Vdb Entry | |
http://www.osvdb.org/30498 | Vdb Entry | |
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=38 | X_refsource_misc | |
http://www.securityfocus.com/archive/1/451952/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/452286/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/458040/100/200/threaded | Mailing List | |
http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=97729 | X_refsource_confirm | |
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34818 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/29069 | 2006-11-16 | |
https://www.exploit-db.com/exploits/29070 | 2006-11-16 | |
http://www.securityfocus.com/bid/21140 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/22972 | 2018-10-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ca Search vendor "Ca" | Host-based Intrusion Prevention System Search vendor "Ca" for product "Host-based Intrusion Prevention System" | core_6.5.4.31 Search vendor "Ca" for product "Host-based Intrusion Prevention System" and version "core_6.5.4.31" | - |
Affected
| ||||||
Ca Search vendor "Ca" | Host-based Intrusion Prevention System Search vendor "Ca" for product "Host-based Intrusion Prevention System" | firewall_6.5.4.10 Search vendor "Ca" for product "Host-based Intrusion Prevention System" and version "firewall_6.5.4.10" | - |
Affected
|