ID

VAR-200703-0244


CVE

CVE-2006-7160


TITLE

Outpost Firewall PRO of sandbox.sys Service disruption in drivers (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-001297

DESCRIPTION

The Sandbox.sys driver in Outpost Firewall PRO 4.0, and possibly earlier versions, does not validate arguments to hooked SSDT functions, which allows local users to cause a denial of service (crash) via invalid arguments to the (1) NtAssignProcessToJobObject,, (2) NtCreateKey, (3) NtCreateThread, (4) NtDeleteFile, (5) NtLoadDriver, (6) NtOpenProcess, (7) NtProtectVirtualMemory, (8) NtReplaceKey, (9) NtTerminateProcess, (10) NtTerminateThread, (11) NtUnloadDriver, and (12) NtWriteVirtualMemory functions. (1) NtAssignProcessToJobObject function (2) NtCreateKey function (3) NtCreateThread function (4) NtDeleteFile function (5) NtLoadDriver function (6) NtOpenProcess function (7) NtProtectVirtualmemory function (8) NtReplaceKey function (9) NtTerminateProcess function (10) NtTerminateThread function (11) NtUnloadDriver function (12) NtWriteVirtualmemory function. Outpost Firewall PRO is prone to multiple local denial-of-service vulnerabilities because the application fails to properly handle unexpected input. Exploiting these issues allows local attackers to crash affected computers, denying service to legitimate users. Remote code-execution may be possible, but this has not been confirmed. Outpost Firewall PRO 4.0 (964.582.059) and 4.0 (971.584.079) are vulnerable to these issues; other versions may also be affected. Outpost Firewall is prone to a denial-of-service vulnerability. ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. The vulnerability is caused due to an error within Sandbox.sys when handling the parameters of certain hooked functions. This can be exploited to cause a DoS by calling NtAssignProcessToJobObject, NtCreateKey, NtCreateThread, NtDeleteFile, NtLoadDriver, NtOpenProcess, NtProtectVirtualMemory, NtReplaceKey, NtTerminateProcess, NtTerminateThread, NtUnloadDriver, and NtWriteVirtualMemory with specially crafted parameters. Other versions may also be affected. SOLUTION: Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: Matousec Transparent Security ORIGINAL ADVISORY: Matousec Transparent Security: http://www.matousec.com/info/advisories/Outpost-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.34

sources: NVD: CVE-2006-7160 // JVNDB: JVNDB-2007-001297 // BID: 21097 // BID: 82061 // VULHUB: VHN-23268 // PACKETSTORM: 52141

AFFECTED PRODUCTS

vendor:agnitummodel:outpost firewallscope:lteversion:4.0

Trust: 1.0

vendor:agnitummodel:outpost firewallscope:lteversion:pro 4.0

Trust: 0.8

vendor:agnitummodel:outpost firewall proscope:eqversion:4.0

Trust: 0.6

vendor:agnitummodel:outpost firewallscope:eqversion:4.0

Trust: 0.6

vendor:agnitummodel:outpost firewall proscope:eqversion:4.0(971.584.079)

Trust: 0.3

vendor:agnitummodel:outpost firewall proscope:eqversion:4.0(964.582.059)

Trust: 0.3

vendor:agnitummodel:outpost firewall proscope:neversion:4.0(1005.590.123)

Trust: 0.3

sources: BID: 21097 // BID: 82061 // JVNDB: JVNDB-2007-001297 // CNNVD: CNNVD-200703-259 // NVD: CVE-2006-7160

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-7160
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-7160
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200703-259
value: MEDIUM

Trust: 0.6

VULHUB: VHN-23268
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-7160
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-23268
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-23268 // JVNDB: JVNDB-2007-001297 // CNNVD: CNNVD-200703-259 // NVD: CVE-2006-7160

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-23268 // JVNDB: JVNDB-2007-001297 // NVD: CVE-2006-7160

THREAT TYPE

local

Trust: 1.3

sources: BID: 21097 // BID: 82061 // PACKETSTORM: 52141 // CNNVD: CNNVD-200703-259

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200703-259

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001297

PATCH

title:Top Pageurl:http://www.agnitum.com/products/outpost/

Trust: 0.8

sources: JVNDB: JVNDB-2007-001297

EXTERNAL IDS

db:NVDid:CVE-2006-7160

Trust: 2.8

db:BIDid:21097

Trust: 2.3

db:SREASONid:2376

Trust: 2.0

db:SECUNIAid:22913

Trust: 1.8

db:VUPENid:ADV-2006-4537

Trust: 1.7

db:XFid:30312

Trust: 0.9

db:JVNDBid:JVNDB-2007-001297

Trust: 0.8

db:CNNVDid:CNNVD-200703-259

Trust: 0.7

db:BUGTRAQid:20061115 OUTPOST MULTIPLE INSUFFICIENT ARGUMENT VALIDATION OF HOOKED SSDT FUNCTION VULNERABILITY

Trust: 0.6

db:BIDid:82061

Trust: 0.4

db:VULHUBid:VHN-23268

Trust: 0.1

db:PACKETSTORMid:52141

Trust: 0.1

sources: VULHUB: VHN-23268 // BID: 21097 // BID: 82061 // JVNDB: JVNDB-2007-001297 // PACKETSTORM: 52141 // CNNVD: CNNVD-200703-259 // NVD: CVE-2006-7160

REFERENCES

url:http://www.matousec.com/info/advisories/outpost-multiple-insufficient-argument-validation-of-hooked-ssdt-functions.php

Trust: 2.4

url:http://www.securityfocus.com/bid/21097

Trust: 2.0

url:http://securityreason.com/securityalert/2376

Trust: 2.0

url:http://secunia.com/advisories/22913

Trust: 1.7

url:http://www.securityfocus.com/archive/1/451672/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/4537

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30312

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/30312

Trust: 0.9

url:http://www.securityfocus.com/archive/1/archive/1/451672/100/0/threaded

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-7160

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-7160

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/4537

Trust: 0.6

url:http://www.agnitum.com/products/outpost/

Trust: 0.3

url:http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php

Trust: 0.3

url:/archive/1/451672

Trust: 0.3

url:/archive/1/479830

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/advisories/22913/

Trust: 0.1

url:http://secunia.com/product/12472/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-23268 // BID: 21097 // BID: 82061 // JVNDB: JVNDB-2007-001297 // PACKETSTORM: 52141 // CNNVD: CNNVD-200703-259 // NVD: CVE-2006-7160

CREDITS

Matousec Transparent Security discovered these issues.

Trust: 0.9

sources: BID: 21097 // CNNVD: CNNVD-200703-259

SOURCES

db:VULHUBid:VHN-23268
db:BIDid:21097
db:BIDid:82061
db:JVNDBid:JVNDB-2007-001297
db:PACKETSTORMid:52141
db:CNNVDid:CNNVD-200703-259
db:NVDid:CVE-2006-7160

LAST UPDATE DATE

2024-08-14T15:25:28.231000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-23268date:2018-10-16T00:00:00
db:BIDid:21097date:2007-09-18T22:30:00
db:BIDid:82061date:2007-03-07T00:00:00
db:JVNDBid:JVNDB-2007-001297date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200703-259date:2007-04-11T00:00:00
db:NVDid:CVE-2006-7160date:2018-10-16T16:29:38.287

SOURCES RELEASE DATE

db:VULHUBid:VHN-23268date:2007-03-07T00:00:00
db:BIDid:21097date:2006-11-15T00:00:00
db:BIDid:82061date:2007-03-07T00:00:00
db:JVNDBid:JVNDB-2007-001297date:2012-06-26T00:00:00
db:PACKETSTORMid:52141date:2006-11-16T15:09:27
db:CNNVDid:CNNVD-200703-259date:2007-03-07T00:00:00
db:NVDid:CVE-2006-7160date:2007-03-07T20:19:00