ID

VAR-200611-0351


CVE

CVE-2006-3973


TITLE

My Firewall Plus Local Privilege Escalation Vulnerability

Trust: 0.9

sources: BID: 21228 // CNNVD: CNNVD-200611-383

DESCRIPTION

My Firewall Plus 5.0 Build 1119 does not verify if explorer.exe is running before launching iexplore.exe from the "Test Your Firewall" feature, which allows local users to gain SYSTEM privileges. My Firewall Plus is prone to a local privilege-escalation vulnerability. A local attacker could exploit this issue to execute arbitrary machine code with SYSTEM-level privileges. A successful exploit could result in the complete compromise of the affected computer. Failed attempts would cause denial-of-service conditions. Version 5.0 Build 1119 is vulnerable; other versions may also be affected. ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. PROVIDED AND/OR DISCOVERED BY: Secunia Research ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2006-59/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ====================================================================== Secunia Research 21/11/2006 - My Firewall Plus Privilege Escalation Vulnerability - ====================================================================== Table of Contents Affected Software....................................................1 Severity.............................................................2 Vendor's Description of Software.....................................3 Description of Vulnerability.........................................4 Solution.............................................................5 Time Table...........................................................6 Credits..............................................................7 References...........................................................8 About Secunia........................................................9 Verification........................................................10 ====================================================================== 1) Affected Software My Firewall Plus 5.0 Build 1119. ====================================================================== 2) Severity Rating: Less critical Impact: Privilege Escalation Where: Local System ====================================================================== 3) Vendor's Description of Software "Corporate strength firewall for your personal PC". The vulnerability is caused due to the application windows running with SYSTEM privileges and the application not checking if explorer.exe is running before performing certain actions. Successful exploitation allows execution of arbitrary commands with SYSTEM privileges. ====================================================================== 5) Solution Enable the password protection to reduce the risk. ====================================================================== 6) Time Table 03/08/2006 - Vendor notified. 03/08/2006 - Vendor response. 16/08/2006 - Vendor reminder sent. 11/10/2006 - Vendor reminder sent. 21/11/2006 - Public disclosure. ====================================================================== 7) Credits Discovered by Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2006-3973 for the vulnerability. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://corporate.secunia.com/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://corporate.secunia.com/secunia_research/33/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/secunia_vacancies/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/secunia_security_advisories/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2006-59/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ====================================================================== _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.16

sources: NVD: CVE-2006-3973 // JVNDB: JVNDB-2006-001909 // BID: 21228 // VULHUB: VHN-20081 // PACKETSTORM: 52409 // PACKETSTORM: 52424

AFFECTED PRODUCTS

vendor:my firewall plusmodel:my firewall plusscope:eqversion:5.0_build_1119

Trust: 1.6

vendor:my firewall plusmodel:my firewall plusscope:eqversion:5.0 build 1119

Trust: 0.8

vendor:webrootmodel:my firewall plus buildscope:eqversion:5.0.01119

Trust: 0.3

sources: BID: 21228 // JVNDB: JVNDB-2006-001909 // CNNVD: CNNVD-200611-383 // NVD: CVE-2006-3973

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-3973
value: HIGH

Trust: 1.0

NVD: CVE-2006-3973
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200611-383
value: HIGH

Trust: 0.6

VULHUB: VHN-20081
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-3973
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-20081
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-20081 // JVNDB: JVNDB-2006-001909 // CNNVD: CNNVD-200611-383 // NVD: CVE-2006-3973

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-3973

THREAT TYPE

local

Trust: 1.1

sources: BID: 21228 // PACKETSTORM: 52409 // PACKETSTORM: 52424 // CNNVD: CNNVD-200611-383

TYPE

Design Error

Trust: 0.9

sources: BID: 21228 // CNNVD: CNNVD-200611-383

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001909

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-20081

PATCH

title:Top pageurl:http://www.webroot.com/En_US/consumer-products.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-001909

EXTERNAL IDS

db:NVDid:CVE-2006-3973

Trust: 2.9

db:BIDid:21228

Trust: 2.0

db:SECUNIAid:21142

Trust: 1.8

db:VUPENid:ADV-2006-4635

Trust: 1.7

db:SECTRACKid:1017267

Trust: 1.7

db:JVNDBid:JVNDB-2006-001909

Trust: 0.8

db:CNNVDid:CNNVD-200611-383

Trust: 0.7

db:BUGTRAQid:20061121 SECUNIA RESEARCH: MY FIREWALL PLUS PRIVILEGE ESCALATIONVULNERABILITY

Trust: 0.6

db:XFid:30476

Trust: 0.6

db:PACKETSTORMid:52424

Trust: 0.2

db:VULHUBid:VHN-20081

Trust: 0.1

db:PACKETSTORMid:52409

Trust: 0.1

sources: VULHUB: VHN-20081 // BID: 21228 // JVNDB: JVNDB-2006-001909 // PACKETSTORM: 52409 // PACKETSTORM: 52424 // CNNVD: CNNVD-200611-383 // NVD: CVE-2006-3973

REFERENCES

url:http://www.securityfocus.com/bid/21228

Trust: 1.7

url:http://secunia.com/secunia_research/2006-59/advisory

Trust: 1.7

url:http://securitytracker.com/id?1017267

Trust: 1.7

url:http://secunia.com/advisories/21142

Trust: 1.7

url:http://www.securityfocus.com/archive/1/452233/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/4635

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30476

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3973

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3973

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/4635

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/30476

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/452233/100/0/threaded

Trust: 0.6

url:http://www.webroot.com/

Trust: 0.3

url:/archive/1/452233

Trust: 0.3

url:http://secunia.com/secunia_research/2006-59/

Trust: 0.2

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/advisories/21142/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/4276/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://corporate.secunia.com/secunia_research/33/

Trust: 0.1

url:http://secunia.com/secunia_research/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://corporate.secunia.com/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3973

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

sources: VULHUB: VHN-20081 // BID: 21228 // JVNDB: JVNDB-2006-001909 // PACKETSTORM: 52409 // PACKETSTORM: 52424 // CNNVD: CNNVD-200611-383 // NVD: CVE-2006-3973

CREDITS

Secunia Research is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 21228 // CNNVD: CNNVD-200611-383

SOURCES

db:VULHUBid:VHN-20081
db:BIDid:21228
db:JVNDBid:JVNDB-2006-001909
db:PACKETSTORMid:52409
db:PACKETSTORMid:52424
db:CNNVDid:CNNVD-200611-383
db:NVDid:CVE-2006-3973

LAST UPDATE DATE

2024-08-14T15:40:42.868000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-20081date:2018-10-17T00:00:00
db:BIDid:21228date:2006-11-26T06:20:00
db:JVNDBid:JVNDB-2006-001909date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200611-383date:2006-11-28T00:00:00
db:NVDid:CVE-2006-3973date:2018-10-17T21:32:34.863

SOURCES RELEASE DATE

db:VULHUBid:VHN-20081date:2006-11-22T00:00:00
db:BIDid:21228date:2006-11-06T00:00:00
db:JVNDBid:JVNDB-2006-001909date:2012-09-25T00:00:00
db:PACKETSTORMid:52409date:2006-11-22T00:45:15
db:PACKETSTORMid:52424date:2006-11-22T02:31:30
db:CNNVDid:CNNVD-200611-383date:2006-11-22T00:00:00
db:NVDid:CVE-2006-3973date:2006-11-22T11:07:00