ID

VAR-200703-0042


CVE

CVE-2007-1330


TITLE

CFP In HKLM\SYSTEM\Software\Comodo\Personal Firewall Vulnerability that bypasses driver protection for registry keys

Trust: 0.8

sources: JVNDB: JVNDB-2007-001667

DESCRIPTION

Comodo Firewall Pro (CFP) (formerly Comodo Personal Firewall) 2.4.18.184 and earlier allows local users to bypass driver protections on the HKLM\SYSTEM\Software\Comodo\Personal Firewall registry key by guessing the name of a named pipe under \Device\NamedPipe\OLE and attempting to open it multiple times. Comodo Firewall Pro is prone to a protection-mechanism-bypass vulnerability. Exploiting this issue allows local attackers to bypass protection mechanisms implemented to restrict access to altering the firewall's configuration settings. This allows them to disable the firewall, aiding them in further attacks. This protection mechanism can be bypassed if very specific conditions are met. CFP uses a named pipe internally. Although the name changes, it can be judged. Processes that open this pipe multiple times can control protected CFP settings, and modifying the settings may result in disabling all protection mechanisms after a restart

Trust: 1.98

sources: NVD: CVE-2007-1330 // JVNDB: JVNDB-2007-001667 // BID: 22775 // VULHUB: VHN-24692

AFFECTED PRODUCTS

vendor:comodomodel:firewall proscope:eqversion:2.4.18.184

Trust: 1.9

vendor:comodomodel:firewall proscope:eqversion:2.4.17.183

Trust: 1.9

vendor:comodomodel:firewall proscope:eqversion:2.4.16.174

Trust: 1.9

vendor:comodomodel:firewall proscope:lteversion:2.4.18.184

Trust: 0.8

vendor:comodomodel:personal firewallscope:eqversion:2.3.6.81

Trust: 0.3

sources: BID: 22775 // JVNDB: JVNDB-2007-001667 // CNNVD: CNNVD-200703-260 // NVD: CVE-2007-1330

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-1330
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-1330
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200703-260
value: MEDIUM

Trust: 0.6

VULHUB: VHN-24692
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-1330
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24692
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-24692 // JVNDB: JVNDB-2007-001667 // CNNVD: CNNVD-200703-260 // NVD: CVE-2007-1330

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-1330

THREAT TYPE

local

Trust: 0.9

sources: BID: 22775 // CNNVD: CNNVD-200703-260

TYPE

Design Error

Trust: 0.9

sources: BID: 22775 // CNNVD: CNNVD-200703-260

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001667

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-24692

PATCH

title:Top Pageurl:http://personalfirewall.comodo.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-001667

EXTERNAL IDS

db:NVDid:CVE-2007-1330

Trust: 2.8

db:BIDid:22775

Trust: 2.0

db:OSVDBid:34957

Trust: 1.7

db:SREASONid:2388

Trust: 1.7

db:JVNDBid:JVNDB-2007-001667

Trust: 0.8

db:CNNVDid:CNNVD-200703-260

Trust: 0.7

db:XFid:32771

Trust: 0.6

db:BUGTRAQid:20070301 COMODO BYPASSING SETTINGS PROTECTION USING MAGIC PIPE VULNERABILITY

Trust: 0.6

db:SEEBUGid:SSVID-83183

Trust: 0.1

db:EXPLOIT-DBid:29695

Trust: 0.1

db:VULHUBid:VHN-24692

Trust: 0.1

sources: VULHUB: VHN-24692 // BID: 22775 // JVNDB: JVNDB-2007-001667 // CNNVD: CNNVD-200703-260 // NVD: CVE-2007-1330

REFERENCES

url:http://www.securityfocus.com/bid/22775

Trust: 1.7

url:http://www.matousec.com/info/advisories/comodo-bypassing-settings-protection-using-magic-pipe.php

Trust: 1.7

url:http://osvdb.org/34957

Trust: 1.7

url:http://securityreason.com/securityalert/2388

Trust: 1.7

url:http://www.securityfocus.com/archive/1/461635/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32771

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1330

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1330

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/32771

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/461635/100/0/threaded

Trust: 0.6

url:http://www.comodo.com/

Trust: 0.3

url:/archive/1/461635

Trust: 0.3

sources: VULHUB: VHN-24692 // BID: 22775 // JVNDB: JVNDB-2007-001667 // CNNVD: CNNVD-200703-260 // NVD: CVE-2007-1330

CREDITS

Matousec※http://www.matousec.com/

Trust: 0.6

sources: CNNVD: CNNVD-200703-260

SOURCES

db:VULHUBid:VHN-24692
db:BIDid:22775
db:JVNDBid:JVNDB-2007-001667
db:CNNVDid:CNNVD-200703-260
db:NVDid:CVE-2007-1330

LAST UPDATE DATE

2024-11-23T22:46:55.044000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-24692date:2018-10-16T00:00:00
db:BIDid:22775date:2015-05-12T19:34:00
db:JVNDBid:JVNDB-2007-001667date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200703-260date:2007-03-09T00:00:00
db:NVDid:CVE-2007-1330date:2024-11-21T00:28:02.870

SOURCES RELEASE DATE

db:VULHUBid:VHN-24692date:2007-03-07T00:00:00
db:BIDid:22775date:2007-03-01T00:00:00
db:JVNDBid:JVNDB-2007-001667date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200703-260date:2007-03-07T00:00:00
db:NVDid:CVE-2007-1330date:2007-03-07T21:19:00