The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Kerio Personal Firewall Service Termination


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 20 Jul 2006 19:43:52 +0200
Subject: [NT] Kerio Personal Firewall Service Termination
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060723103620.2EB5957BC@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Kerio Personal Firewall Service Termination
------------------------------------------------------------------------


SUMMARY

Sunbelt Kerio Personal Firewall is a popular firewall software for Windows 
systems.

A vulnerability in the Kerio Firewall software allows to crash its 
service, thus bypassing the firewall.

DETAILS

Vulnerable Systems:
 * Sunbelt Kerio Personal Firewall 4.3.246

Immune Systems:
 * Sunbelt Kerio Personal Firewall 4.3.268
 * Sunbelt Kerio Personal Firewall 4.2.3.912

Kerio uses strange ring3 hooks that communicates the Kerio driver using an 
interrupt. Windows API CreateRemoteThread is hooked by Kerio in user mode 
in every process. Calling this API can cause a crash of the Kerio service 
'kpf4ss.exe'. The cause of this behavior is unknown. The crash of the 
Kerio service equals to disabling the protection. The tray icon of Kerio 
is not functional any more after exploiting the bug, any application can 
perform arbitrary protected action including Internet access and process 
creation.

Disclosure Timeline:
 * 2006-07-15: Vendor notification
 * 2006-07-15: Advisory released
 * 2006-07-17: Vulnerability confirmed by popular information sources
 * 2006-07-17: Received request from the product vendor to temporarily 
remove the exploit code


ADDITIONAL INFORMATION

The information has been provided by matousec.com.
The original article can be found at:
 
<http://www.matousec.com/info/advisories/Kerio-Terminating-kpf4ss-exe-using-internal-runtime-error.php>; http://www.matousec.com/info/advisories/Kerio-Terminating-kpf4ss-exe-using-internal-runtime-error.php




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру