ID

VAR-200702-0108


CVE

CVE-2007-0709


TITLE

Comodo Firewall Pro and Comodo Personal Firewall of cmdmon.sys Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-001514

DESCRIPTION

cmdmon.sys in Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.16.174 and earlier does not validate arguments that originate in user mode for the (1) NtCreateSection, (2) NtOpenProcess, (3) NtOpenSection, (4) NtOpenThread, and (5) NtSetValueKey hooked SSDT functions, which allows local users to cause a denial of service (system crash) and possibly gain privileges via invalid arguments. Comodo Firewall Pro is prone to a denial-of-service vulnerability. Local attackers may exploit this vulnerability to cause denial of service. The Comodo firewall hooks many functions in SSDT, and there are at least 7 cases where there are no parameters for verifying user mode. Due to a bug in the cmdmon.sys driver, a denial of service may result when calling NtConnectPort, NtCreatePort, NtCreateSection, NtOpenProcess, NtOpenSection, NtOpenThread, and NtSetValueKey

Trust: 1.98

sources: NVD: CVE-2007-0709 // JVNDB: JVNDB-2007-001514 // BID: 81908 // VULHUB: VHN-24071

AFFECTED PRODUCTS

vendor:comodomodel:firewall proscope:lteversion:2.4.16.174

Trust: 1.8

vendor:comodomodel:firewall proscope:eqversion:2.4.16.174

Trust: 0.9

sources: BID: 81908 // JVNDB: JVNDB-2007-001514 // CNNVD: CNNVD-200702-040 // NVD: CVE-2007-0709

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0709
value: HIGH

Trust: 1.0

NVD: CVE-2007-0709
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200702-040
value: HIGH

Trust: 0.6

VULHUB: VHN-24071
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0709
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24071
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-24071 // JVNDB: JVNDB-2007-001514 // CNNVD: CNNVD-200702-040 // NVD: CVE-2007-0709

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0709

THREAT TYPE

local

Trust: 0.9

sources: BID: 81908 // CNNVD: CNNVD-200702-040

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200702-040

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001514

PATCH

title:Top Pageurl:http://personalfirewall.comodo.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-001514

EXTERNAL IDS

db:NVDid:CVE-2007-0709

Trust: 2.8

db:BIDid:22357

Trust: 2.0

db:SECTRACKid:1017580

Trust: 2.0

db:XFid:32059

Trust: 0.9

db:JVNDBid:JVNDB-2007-001514

Trust: 0.8

db:CNNVDid:CNNVD-200702-040

Trust: 0.7

db:BUGTRAQid:20070201 COMODO MULTIPLE INSUFFICIENT ARGUMENT VALIDATION OF HOOKED SSDT FUNCTION VULNERABILITY

Trust: 0.6

db:BIDid:81908

Trust: 0.4

db:VULHUBid:VHN-24071

Trust: 0.1

sources: VULHUB: VHN-24071 // BID: 81908 // JVNDB: JVNDB-2007-001514 // CNNVD: CNNVD-200702-040 // NVD: CVE-2007-0709

REFERENCES

url:http://www.securityfocus.com/bid/22357

Trust: 2.0

url:http://www.matousec.com/info/advisories/comodo-multiple-insufficient-argument-validation-of-hooked-ssdt-functions.php

Trust: 2.0

url:http://securitytracker.com/id?1017580

Trust: 2.0

url:http://www.securityfocus.com/archive/1/458773/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32059

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/32059

Trust: 0.9

url:http://www.securityfocus.com/archive/1/archive/1/458773/100/0/threaded

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0709

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0709

Trust: 0.8

sources: VULHUB: VHN-24071 // BID: 81908 // JVNDB: JVNDB-2007-001514 // CNNVD: CNNVD-200702-040 // NVD: CVE-2007-0709

CREDITS

Matousec※http://www.matousec.com/

Trust: 0.6

sources: CNNVD: CNNVD-200702-040

SOURCES

db:VULHUBid:VHN-24071
db:BIDid:81908
db:JVNDBid:JVNDB-2007-001514
db:CNNVDid:CNNVD-200702-040
db:NVDid:CVE-2007-0709

LAST UPDATE DATE

2024-11-23T22:19:53.273000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-24071date:2018-10-16T00:00:00
db:BIDid:81908date:2007-02-03T00:00:00
db:JVNDBid:JVNDB-2007-001514date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200702-040date:2007-02-06T00:00:00
db:NVDid:CVE-2007-0709date:2024-11-21T00:26:32.880

SOURCES RELEASE DATE

db:VULHUBid:VHN-24071date:2007-02-04T00:00:00
db:BIDid:81908date:2007-02-03T00:00:00
db:JVNDBid:JVNDB-2007-001514date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200702-040date:2007-02-03T00:00:00
db:NVDid:CVE-2007-0709date:2007-02-04T00:28:00