Vulnerability Description
Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kerio | Personal Firewall | 4.0.6 |
References
- http://marc.info/?l=bugtraq&m=109420310631039&w=2
- http://secunia.com/advisories/12468/Vendor Advisory
- http://www.security.org.sg/vuln/kerio4016.htmlVendor Advisory
- http://www.securityfocus.com/bid/11096ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17270
- http://marc.info/?l=bugtraq&m=109420310631039&w=2
- http://secunia.com/advisories/12468/Vendor Advisory
- http://www.security.org.sg/vuln/kerio4016.htmlVendor Advisory
- http://www.securityfocus.com/bid/11096ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17270
FAQ
What is CVE-2004-1658?
CVE-2004-1658 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalm...
How severe is CVE-2004-1658?
CVE-2004-1658 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1658?
Check the references section above for vendor advisories and patch information. Affected products include: Kerio Personal Firewall.