Zonealarm free firewall 2018 sandbox8/9/2023 Sygate Personal Firewall relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. The crash occurs when the driver performs a memset operation which uses a size beyond the size of buffer specified, causing kernel crash.Ĭomodo Internet Security before 57.2253 on Windows 7 圆4 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value.Ħ Antivirus Plus Firewall, Comodo Personal Firewall, Personal Firewall and 3 moreĬomodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.ĪntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. This can trigger an out-of-bounds write if lpOutBuffer parameter in FilterSendMessage API is near the end of specified buffer bounds. Once this occurs, a specially crafted message can be sent to "cmdServicePort" using "FilterSendMessage" API. A low privileged process can crash CmdVirth.exe to decrease the port's connection count followed by process hollowing a CmdVirth.exe instance with malicious code to obtain a handle to "cmdServicePort". and below are vulnerable to Denial of Service affecting CmdGuard.sys via its filter port "cmdServicePort". This section object is exposed by CmdAgent and contains a SharedMemoryDictionary object, which allows a low privileged process to modify the object data causing CmdAgent.exe to crash.Ĭomodo Antivirus versions 11. and below are vulnerable to Denial of Service affecting CmdAgent.exe via an unprotected section object "_CisSharedMemBuff". A local process can bypass the signature check enforced by CmdAgent via process hollowing which can then allow the process to invoke sensitive COM methods in CmdAgent such as writing to the registry with SYSTEM privileges.Ĭomodo Antivirus through 12., Comodo Firewall through 12., and Comodo Internet Security Premium through 12., with the Comodo Container feature, are vulnerable to Sandbox Escape.Ĭomodo Antivirus versions 12. are vulnerable to Local Privilege Escalation due to CmdAgent's handling of COM clients. This results in CmdVirth.exe and its child svchost.exe instances to terminate.Ĭomodo Antivirus versions up to 12. A low privileged local process can connect to this port and send an LPC_DATAGRAM, which triggers an Access Violation due to hardcoded NULLs used for Source parameter in a memcpy operation that is called for this handler. are vulnerable to a local Denial of Service affecting CmdVirth.exe via its LPC port "cmdvrtLPCServerPort". This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.Ĭomodo Antivirus versions up to 12. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This allows an attacker to cause a denial of service (BSOD) when an executable is run inside the container.Īn issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. can be triggered due to a race condition when handling IRP_MJ_CLEANUP requests in the minifilter for directory change notifications. Cavwp.exe loads Comodo antivirus definition database in unsecured global section objects, allowing a local low privileged process to modify this data directly and change virus signatures.Ī use-after-free flaw in the sandbox container implemented in cmdguard.sys in Comodo Antivirus 12. are vulnerable to Arbitrary File Write due to Cavwp.exe handling of Comodo's Antivirus database. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder.Ĭomodo Antivirus versions up to 12. has a quarantine flaw that allows privilege escalation. Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL.Ĭomodo Antivirus 12.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |