ID

VAR-200701-0265


CVE

CVE-2006-6952


TITLE

Computer Associates HIPS Driver Core kmxstart.sys Vulnerabilities in which user privileges are acquired

Trust: 0.8

sources: JVNDB: JVNDB-2007-001244

DESCRIPTION

Computer Associates Host Intrusion Prevention System (HIPS) drivers (1) Core kmxstart.sys 6.5.4.31 and (2) Firewall kmxfw.sys 6.5.4.10 allow local users to gain privileges by using certain privileged IOCTLs to modify callback function pointers. Multiple Computer Associates security-related products are prone to multiple local privilege-escalation vulnerabilities. An attacker can leverage these issues to execute arbitrary code with SYSTEM-level privileges. This could result in the complete compromise of vulnerable computers. These isses affect CA Personal Firewall 2007 (v9.0) Engine version 1.0.173 and prior and CA Internet Security Suite 2007 version 3.0 with CA Personal Firewall 2007 version 9.0 Engine version 1.0.173 and prior. Computer Associates is the world's leading security vendor, products include a variety of anti-virus software and backup recovery systems. There is a problem in the implementation of the driver of CA HIPS products, and local attackers may use this vulnerability to elevate their privileges. ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: CA Personal Firewall HIPS Drivers Privilege Escalation SECUNIA ADVISORY ID: SA22972 VERIFY ADVISORY: http://secunia.com/advisories/22972/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: CA Personal Firewall 2007 9.x http://secunia.com/product/12660/ DESCRIPTION: Rub\xe9n Santamarta has reported some vulnerabilities in CA Personal Firewall, which can be exploited by malicious people to gain escalated privileges. The vulnerabilities are caused due to errors in the HIPS Core (KmxStart.sys) and HIPS Firewall (KmxFw.sys) drivers. This can be exploited to modify some implemented callbacks via certain privileged IOCTLs. Other versions and products may also be affected. SOLUTION: Grant only trusted users access to affected systems. The vendor is reportedly working on the patches. PROVIDED AND/OR DISCOVERED BY: Rub\xe9n Santamarta, reversemode.com. ORIGINAL ADVISORY: Reversemode.com: http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=38 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Local attackers can exploit these vulnerabilities to gain escalated privileges. Mitigating Factors: Local user account required for exploitation. Severity: CA has given these vulnerability issues a Medium risk rating. Customers running one of the affected products simply need to ensure that they have allowed this automatic update to take place. Determining if you are affected: To ensure that the update has taken place, customers can view the Help > About screen in their CA Personal Firewall product and confirm that their engine version number is 1.0.176 or higher. http://marc.theaimsgroup.com/?l=bugtraq&m=116379521731676&w=2 Changelog for this advisory: v1.0 - Initial Release Customers who require additional information should contact CA Technical Support at http://supportconnect.ca.com. For technical questions or comments related to this advisory, please send email to vuln@ca.com. If you discover a vulnerability in CA products, please report your findings to vuln@ca.com, or utilize our "Submit a Vulnerability" form. URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx Regards, Ken Williams ; 0xE2941985 Director, CA Vulnerability Research CA, One CA Plaza, Islandia, NY 11749 Contact http://www3.ca.com/contact/ Legal Notice http://www3.ca.com/legal/ Privacy Policy http://www3.ca.com/privacy/ Copyright (c) 2007 CA. All rights reserved

Trust: 2.16

sources: NVD: CVE-2006-6952 // JVNDB: JVNDB-2007-001244 // BID: 21140 // VULHUB: VHN-23060 // PACKETSTORM: 52231 // PACKETSTORM: 53998

AFFECTED PRODUCTS

vendor:camodel:host-based intrusion prevention systemscope:eqversion:firewall_6.5.4.10

Trust: 1.6

vendor:camodel:host-based intrusion prevention systemscope:eqversion:core_6.5.4.31

Trust: 1.6

vendor:camodel:host-based intrusion prevention systemscope:eqversion:core kmxstart.sys 6.5.4.31

Trust: 0.8

vendor:camodel:host-based intrusion prevention systemscope:eqversion:firewall kmxfw.sys 6.5.4.10

Trust: 0.8

vendor:computermodel:associates personal firewallscope:eqversion:9.0

Trust: 0.3

vendor:computermodel:associates internet security suitescope:eqversion:20073.0

Trust: 0.3

vendor:computermodel:associates internet security suitescope:eqversion:20070

Trust: 0.3

sources: BID: 21140 // JVNDB: JVNDB-2007-001244 // CNNVD: CNNVD-200701-407 // NVD: CVE-2006-6952

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-6952
value: HIGH

Trust: 1.0

NVD: CVE-2006-6952
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200701-407
value: HIGH

Trust: 0.6

VULHUB: VHN-23060
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-6952
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-23060
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-23060 // JVNDB: JVNDB-2007-001244 // CNNVD: CNNVD-200701-407 // NVD: CVE-2006-6952

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-6952

THREAT TYPE

local

Trust: 1.0

sources: BID: 21140 // PACKETSTORM: 53998 // CNNVD: CNNVD-200701-407

TYPE

Design Error

Trust: 0.9

sources: BID: 21140 // CNNVD: CNNVD-200701-407

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001244

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-23060

PATCH

title:Top Pageurl:http://www.ca.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-001244

EXTERNAL IDS

db:NVDid:CVE-2006-6952

Trust: 2.9

db:BIDid:21140

Trust: 2.0

db:SECUNIAid:22972

Trust: 1.8

db:OSVDBid:30497

Trust: 1.8

db:OSVDBid:30498

Trust: 1.8

db:JVNDBid:JVNDB-2007-001244

Trust: 0.8

db:CNNVDid:CNNVD-200701-407

Trust: 0.7

db:BUGTRAQid:20070124 [CAID 34818]: CA PERSONAL FIREWALL MULTIPLE PRIVILEGE ESCALATION VULNERABILITIES

Trust: 0.6

db:BUGTRAQid:20061116 [REVERSEMODE ADVISORY] COMPUTER ASSOCIATES HIPS DRIVERS - MULTIPLE LOCAL PRIVILEGE ESCALATION VULNERABILITIES.

Trust: 0.6

db:BUGTRAQid:20061121 RE: [REVERSEMODE ADVISORY] COMPUTER ASSOCIATES HIPS DRIVERS - MULTIPLE LOCAL PRIVILEGE ESCALATION VULNERABILITIES.

Trust: 0.6

db:PACKETSTORMid:53998

Trust: 0.2

db:EXPLOIT-DBid:29069

Trust: 0.1

db:EXPLOIT-DBid:29070

Trust: 0.1

db:SEEBUGid:SSVID-82607

Trust: 0.1

db:SEEBUGid:SSVID-82608

Trust: 0.1

db:VULHUBid:VHN-23060

Trust: 0.1

db:PACKETSTORMid:52231

Trust: 0.1

sources: VULHUB: VHN-23060 // BID: 21140 // JVNDB: JVNDB-2007-001244 // PACKETSTORM: 52231 // PACKETSTORM: 53998 // CNNVD: CNNVD-200701-407 // NVD: CVE-2006-6952

REFERENCES

url:http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=97729

Trust: 1.8

url:http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34818

Trust: 1.8

url:http://www.securityfocus.com/bid/21140

Trust: 1.7

url:http://www.securityfocus.com/archive/1/452286/100/0/threaded

Trust: 1.7

url:http://www.osvdb.org/30497

Trust: 1.7

url:http://www.osvdb.org/30498

Trust: 1.7

url:http://secunia.com/advisories/22972

Trust: 1.7

url:http://www.reversemode.com/index.php?option=com_remository&itemid=2&func=fileinfo&id=38

Trust: 1.7

url:http://www.securityfocus.com/archive/1/451952/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/458040/100/200/threaded

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6952

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-6952

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/451952/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/458040/100/200/threaded

Trust: 0.6

url:http://www.reversemode.com/index.php?option=com_remository&itemid=2&func=download&id=38&chk=23a19c23a44e6095e872e8b3f7fca9c8

Trust: 0.3

url:http://www.ca.com

Trust: 0.3

url:/archive/1/451952

Trust: 0.3

url:/archive/1/452286

Trust: 0.3

url:http://www.reversemode.com/index.php?option=com_remository&itemid=2&func=fileinfo&id=38

Trust: 0.1

url:http://secunia.com/advisories/22972/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/12660/

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.reversemode.com/index.php?option=com_content&task=view&id=27&itemid=2

Trust: 0.1

url:http://osvdb.org/30498

Trust: 0.1

url:http://marc.theaimsgroup.com/?l=bugtraq&m=116379521731676&w=2

Trust: 0.1

url:http://supportconnect.ca.com.

Trust: 0.1

url:http://www3.ca.com/legal/

Trust: 0.1

url:http://crm.my-etrust.com/login.asp?username=guest&target=document&openparameter=2680

Trust: 0.1

url:http://supportconnect.ca.com/

Trust: 0.1

url:http://osvdb.org/30497

Trust: 0.1

url:http://www3.ca.com/contact/

Trust: 0.1

url:http://www3.ca.com/privacy/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-6952

Trust: 0.1

url:http://www3.ca.com/securityadvisor/vulninfo/submit.aspx

Trust: 0.1

sources: VULHUB: VHN-23060 // BID: 21140 // JVNDB: JVNDB-2007-001244 // PACKETSTORM: 52231 // PACKETSTORM: 53998 // CNNVD: CNNVD-200701-407 // NVD: CVE-2006-6952

CREDITS

Rubén Santamarta

Trust: 0.6

sources: CNNVD: CNNVD-200701-407

SOURCES

db:VULHUBid:VHN-23060
db:BIDid:21140
db:JVNDBid:JVNDB-2007-001244
db:PACKETSTORMid:52231
db:PACKETSTORMid:53998
db:CNNVDid:CNNVD-200701-407
db:NVDid:CVE-2006-6952

LAST UPDATE DATE

2024-08-14T15:45:27.725000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-23060date:2018-10-16T00:00:00
db:BIDid:21140date:2007-01-25T22:29:00
db:JVNDBid:JVNDB-2007-001244date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200701-407date:2007-01-25T00:00:00
db:NVDid:CVE-2006-6952date:2018-10-16T16:29:10.037

SOURCES RELEASE DATE

db:VULHUBid:VHN-23060date:2007-01-24T00:00:00
db:BIDid:21140date:2006-11-16T00:00:00
db:JVNDBid:JVNDB-2007-001244date:2012-06-26T00:00:00
db:PACKETSTORMid:52231date:2006-11-17T23:30:18
db:PACKETSTORMid:53998date:2007-01-27T03:02:12
db:CNNVDid:CNNVD-200701-407date:2006-11-16T00:00:00
db:NVDid:CVE-2006-6952date:2007-01-24T23:28:00