" TITLE: Kerio Personal Firewall Privilege Escalation Vulnerability SECUNIA ADVISORY ID: SA10746 VERIFY ADVISORY: http://www.secunia.com/advisories/10746/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: Kerio Personal Firewall 2.x DESCRIPTION: Tuneld.com has reported a vulnerability in Kerio Personal Firewall, allowing malicious, local users to escalate their privileges. The function used to load configuration files can be exploited to open arbitrary programs with SYSTEM privileges. The vulnerability has been reported in version 2.1.5. Other versions may also be affected. SOLUTION: Do not use Kerio Personal Firewall on systems with untrusted local users. PROVIDED AND/OR DISCOVERED BY: Tuneld.com ORIGINAL ADVISORY: http://www.tuneld.com/news/?id=30 " von http://www.secunia.com __________ http://www.downclockers.com/ourforum/index.php?board=71.0 Reverse Engineering Malware
Um auf dieses Thema zu ANTWORTEN bitte erst » hier kostenlos registrieren!!
"
TITLE:
Kerio Personal Firewall Privilege Escalation Vulnerability
SECUNIA ADVISORY ID:
SA10746
VERIFY ADVISORY:
http://www.secunia.com/advisories/10746/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
Kerio Personal Firewall 2.x
DESCRIPTION:
Tuneld.com has reported a vulnerability in Kerio Personal Firewall,
allowing malicious, local users to escalate their privileges.
The function used to load configuration files can be exploited to
open arbitrary programs with SYSTEM privileges.
The vulnerability has been reported in version 2.1.5. Other versions
may also be affected.
SOLUTION:
Do not use Kerio Personal Firewall on systems with untrusted local
users.
PROVIDED AND/OR DISCOVERED BY:
Tuneld.com
ORIGINAL ADVISORY:
http://www.tuneld.com/news/?id=30
"
von
http://www.secunia.com
__________
http://www.downclockers.com/ourforum/index.php?board=71.0 Reverse Engineering Malware