ID

VAR-200611-0067


CVE

CVE-2006-5721


TITLE

Outpost Firewall PRO Local Denial of Service Vulnerability

Trust: 0.9

sources: BID: 20860 // CNNVD: CNNVD-200611-054

DESCRIPTION

The \Device\SandBox driver in Outpost Firewall PRO 4.0 (964.582.059) allows local users to cause a denial of service (system crash) via an invalid argument to the DeviceIoControl function that triggers an invalid memory operation. Outpost Firewall PRO is prone to a local denial-of-service vulnerability because the application fails to properly handle unexpected input. Exploiting this issue allows local attackers to crash affected computers, denying service to legitimate users. Outpost Firewall PRO 4.0 (964.582.059) is vulnerable to this issue; other versions may also be affected. ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Outpost Firewall "Sandbox" Driver Denial Of Service Vulnerability SECUNIA ADVISORY ID: SA22673 VERIFY ADVISORY: http://secunia.com/advisories/22673/ CRITICAL: Not critical IMPACT: DoS WHERE: Local system SOFTWARE: Outpost Firewall Pro 4.x http://secunia.com/product/12472/ DESCRIPTION: Matousec has discovered a vulnerability in Outpost Firewall, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the handling of data sent to the "Device\Sandbox" device. This can be exploited to crash a vulnerable system by sending arbitrary data to the said device. The vulnerability is confirmed in version 4.0.964.6926 (582). Other versions may be affected as well. SOLUTION: Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: Matousec Transparent Security ORIGINAL ADVISORY: Matousec Transparent Security: http://www.matousec.com/info/advisories/Outpost-Insufficient-validation-of-SandBox-driver-input-buffer.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-5721 // JVNDB: JVNDB-2006-001490 // BID: 20860 // VULHUB: VHN-21829 // PACKETSTORM: 51577

AFFECTED PRODUCTS

vendor:agnitummodel:outpost firewallscope:eqversion:4.0

Trust: 1.6

vendor:agnitummodel:outpost firewallscope:eqversion:pro 4.0

Trust: 0.8

vendor:agnitummodel:outpost firewall proscope:eqversion:4.0(964.582.059)

Trust: 0.3

sources: BID: 20860 // JVNDB: JVNDB-2006-001490 // CNNVD: CNNVD-200611-054 // NVD: CVE-2006-5721

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-5721
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-5721
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200611-054
value: MEDIUM

Trust: 0.6

VULHUB: VHN-21829
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-5721
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-21829
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-21829 // JVNDB: JVNDB-2006-001490 // CNNVD: CNNVD-200611-054 // NVD: CVE-2006-5721

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-5721

THREAT TYPE

local

Trust: 1.0

sources: BID: 20860 // PACKETSTORM: 51577 // CNNVD: CNNVD-200611-054

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200611-054

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001490

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-21829

PATCH

title:Top Pageurl:http://www.agnitum.com/products/outpost/

Trust: 0.8

sources: JVNDB: JVNDB-2006-001490

EXTERNAL IDS

db:NVDid:CVE-2006-5721

Trust: 2.5

db:BIDid:20860

Trust: 2.0

db:SECUNIAid:22673

Trust: 1.8

db:VUPENid:ADV-2006-4309

Trust: 1.7

db:SREASONid:1821

Trust: 1.7

db:SECTRACKid:1017150

Trust: 1.7

db:JVNDBid:JVNDB-2006-001490

Trust: 0.8

db:CNNVDid:CNNVD-200611-054

Trust: 0.7

db:XFid:29969

Trust: 0.6

db:BUGTRAQid:20061101 OUTPOST INSUFFICIENT VALIDATION OF 'SANDBOX' DRIVER INPUT BUFFER

Trust: 0.6

db:SEEBUGid:SSVID-82438

Trust: 0.1

db:EXPLOIT-DBid:28894

Trust: 0.1

db:VULHUBid:VHN-21829

Trust: 0.1

db:PACKETSTORMid:51577

Trust: 0.1

sources: VULHUB: VHN-21829 // BID: 20860 // JVNDB: JVNDB-2006-001490 // PACKETSTORM: 51577 // CNNVD: CNNVD-200611-054 // NVD: CVE-2006-5721

REFERENCES

url:http://www.matousec.com/info/advisories/outpost-insufficient-validation-of-sandbox-driver-input-buffer.php

Trust: 1.8

url:http://www.securityfocus.com/bid/20860

Trust: 1.7

url:http://securitytracker.com/id?1017150

Trust: 1.7

url:http://secunia.com/advisories/22673

Trust: 1.7

url:http://securityreason.com/securityalert/1821

Trust: 1.7

url:http://www.securityfocus.com/archive/1/450293/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/4309

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/29969

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5721

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-5721

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/450293/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/4309

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/29969

Trust: 0.6

url:http://www.agnitum.com/products/outpost/

Trust: 0.3

url:/archive/1/450293

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/advisories/22673/

Trust: 0.1

url:http://secunia.com/product/12472/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-21829 // BID: 20860 // JVNDB: JVNDB-2006-001490 // PACKETSTORM: 51577 // CNNVD: CNNVD-200611-054 // NVD: CVE-2006-5721

CREDITS

Matousec Transparent Security discovered this issue.

Trust: 0.9

sources: BID: 20860 // CNNVD: CNNVD-200611-054

SOURCES

db:VULHUBid:VHN-21829
db:BIDid:20860
db:JVNDBid:JVNDB-2006-001490
db:PACKETSTORMid:51577
db:CNNVDid:CNNVD-200611-054
db:NVDid:CVE-2006-5721

LAST UPDATE DATE

2024-08-14T14:29:05.021000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-21829date:2018-10-17T00:00:00
db:BIDid:20860date:2006-11-02T17:32:00
db:JVNDBid:JVNDB-2006-001490date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200611-054date:2006-11-07T00:00:00
db:NVDid:CVE-2006-5721date:2018-10-17T21:44:17.067

SOURCES RELEASE DATE

db:VULHUBid:VHN-21829date:2006-11-04T00:00:00
db:BIDid:20860date:2006-11-01T00:00:00
db:JVNDBid:JVNDB-2006-001490date:2012-06-26T00:00:00
db:PACKETSTORMid:51577date:2006-11-02T15:01:38
db:CNNVDid:CNNVD-200611-054date:2006-11-03T00:00:00
db:NVDid:CVE-2006-5721date:2006-11-04T01:07:00