The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Webroot Desktop Firewall Two Vulnerabilities


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 10 Oct 2005 13:44:47 +0200
Subject: [NT] Webroot Desktop Firewall Two Vulnerabilities
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20051010122340.1AFE058CF@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Webroot Desktop Firewall Two Vulnerabilities
------------------------------------------------------------------------


SUMMARY

 <http://www.webroot.com/consumer/products/desktopfirewall/>; Webroot 
Desktop Firewall "secures your computer from Internet threats and reduces 
the risks of being a victim of online crimes".

Secunia Research has discovered two vulnerabilities in Webroot Desktop 
Firewall, which can be exploited by malicious, local users to gain 
escalated privileges or bypass certain security restrictions.

DETAILS

Vulnerable Systems:
 * Webroot Desktop Firewall version 1.3.0 build 43

Immune Systems:
 * Webroot Desktop Firewall version 1.3.0 build 52

1) A boundary error in PWIWrapper.dll when deleting a program from the 
list of "allowed" programs can cause a buffer overflow in
FirewallNTService.exe. This can be exploited by sending a specially 
crafted application chain to the firewall driver via a DeviceIoControl() 
command, and then removing an "allowed" program from the firewall GUI.

Successful exploitation allows non-privileged users to execute arbitrary 
code with SYSTEM privileges, but requires the the ability
to add and remove programs from the firewall's permitted application list.

2) It is possible for non-privileged users to disable the firewall even 
when password protection has been enabled, by sending specific 
DeviceIoControl() commands to the firewall driver.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:vuln@secunia.com.> Secunia 
Research.
The original article can be found at:  
<http://support.webroot.com/ics/support/KBAnswer.asp?questionID=2332>; 
http://support.webroot.com/ics/support/KBAnswer.asp?questionID=2332




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру