ID

VAR-200607-0236


CVE

CVE-2006-3696


TITLE

Outpost Firewall of filtnt.sys Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2006-002818

DESCRIPTION

filtnt.sys in Outpost Firewall Pro before 3.51.759.6511 (462) allows local users to cause a denial of service (crash) via long arguments to mshta.exe. Outpost Firewall is prone to a local denial-of-service vulnerability. An attacker can exploit this issue to crash the application, effectively denying service. Outpost Firewall Pro version 3.5.631 is affected by this issue; other versions may also be vulnerable. ---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. The vulnerability is caused due to an unspecified error in the Virtual Firewall driver (filtnt.sys) and can be exploited to crash the system by e.g. passing an overly long string as command line argument to mshta.exe. The vulnerability has been reported in version 3.5.631. Other versions may also be affected. SOLUTION: Update to version 3.51.759.6511 (462) or later. PROVIDED AND/OR DISCOVERED BY: Bipin Gautam ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-3696 // JVNDB: JVNDB-2006-002818 // BID: 19026 // VULHUB: VHN-19804 // PACKETSTORM: 48306

AFFECTED PRODUCTS

vendor:agnitummodel:outpost firewallscope:eqversion:3.5.631

Trust: 1.9

vendor:agnitummodel:outpost firewallscope:ltversion:pro 3.51.759.6511 (462)

Trust: 0.8

vendor:agnitummodel:outpost firewallscope:neversion:3.51.759.6511(462)

Trust: 0.3

sources: BID: 19026 // JVNDB: JVNDB-2006-002818 // CNNVD: CNNVD-200607-318 // NVD: CVE-2006-3696

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-3696
value: LOW

Trust: 1.0

NVD: CVE-2006-3696
value: LOW

Trust: 0.8

CNNVD: CNNVD-200607-318
value: LOW

Trust: 0.6

VULHUB: VHN-19804
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2006-3696
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-19804
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-19804 // JVNDB: JVNDB-2006-002818 // CNNVD: CNNVD-200607-318 // NVD: CVE-2006-3696

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-3696

THREAT TYPE

local

Trust: 1.0

sources: BID: 19026 // PACKETSTORM: 48306 // CNNVD: CNNVD-200607-318

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 19026 // CNNVD: CNNVD-200607-318

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-002818

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-19804

PATCH

title:Top Pageurl:http://www.agnitum.com/

Trust: 0.8

sources: JVNDB: JVNDB-2006-002818

EXTERNAL IDS

db:NVDid:CVE-2006-3696

Trust: 2.5

db:BIDid:19026

Trust: 2.0

db:SECUNIAid:21095

Trust: 1.8

db:VUPENid:ADV-2006-2853

Trust: 1.7

db:SREASONid:1247

Trust: 1.7

db:JVNDBid:JVNDB-2006-002818

Trust: 0.8

db:CNNVDid:CNNVD-200607-318

Trust: 0.7

db:BUGTRAQid:20060717 OUTPOST FIREWALL PRO SECRATELY FIXING SECURITY FLAWS?

Trust: 0.6

db:XFid:27840

Trust: 0.6

db:EXPLOIT-DBid:28232

Trust: 0.1

db:SEEBUGid:SSVID-81809

Trust: 0.1

db:VULHUBid:VHN-19804

Trust: 0.1

db:PACKETSTORMid:48306

Trust: 0.1

sources: VULHUB: VHN-19804 // BID: 19026 // JVNDB: JVNDB-2006-002818 // PACKETSTORM: 48306 // CNNVD: CNNVD-200607-318 // NVD: CVE-2006-3696

REFERENCES

url:http://www.securityfocus.com/bid/19026

Trust: 1.7

url:http://www.securityfocus.com/archive/1/440427

Trust: 1.7

url:http://secunia.com/advisories/21095

Trust: 1.7

url:http://securityreason.com/securityalert/1247

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/2853

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/27840

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3696

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3696

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/2853

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/27840

Trust: 0.6

url:http://www.agnitum.com/

Trust: 0.3

url:/archive/1/440427

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/7908/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/advisories/21095/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-19804 // BID: 19026 // JVNDB: JVNDB-2006-002818 // PACKETSTORM: 48306 // CNNVD: CNNVD-200607-318 // NVD: CVE-2006-3696

CREDITS

Bipin Gautam is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 19026 // CNNVD: CNNVD-200607-318

SOURCES

db:VULHUBid:VHN-19804
db:BIDid:19026
db:JVNDBid:JVNDB-2006-002818
db:PACKETSTORMid:48306
db:CNNVDid:CNNVD-200607-318
db:NVDid:CVE-2006-3696

LAST UPDATE DATE

2024-08-14T15:45:34.113000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-19804date:2017-07-20T00:00:00
db:BIDid:19026date:2006-07-18T21:28:00
db:JVNDBid:JVNDB-2006-002818date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200607-318date:2006-08-15T00:00:00
db:NVDid:CVE-2006-3696date:2017-07-20T01:32:30.007

SOURCES RELEASE DATE

db:VULHUBid:VHN-19804date:2006-07-21T00:00:00
db:BIDid:19026date:2006-07-17T00:00:00
db:JVNDBid:JVNDB-2006-002818date:2012-12-20T00:00:00
db:PACKETSTORMid:48306date:2006-07-18T20:56:43
db:CNNVDid:CNNVD-200607-318date:2006-07-21T00:00:00
db:NVDid:CVE-2006-3696date:2006-07-21T14:03:00