First published: Mon Dec 18 2006(Updated: )
AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Look 'n' Stop Firewall | =2.05p2 | |
AVG Antivirus Plus Firewall | =7.5.431 | |
Comodo Firewall Pro | =2.3.6.81 | |
Infoprocess Antihook | =3.0.23 | |
Sygate Technologies | =5.6.2808 | |
Filseclab Personal Firewall | =3.0.8686 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6618 is classified as a medium severity vulnerability.
To mitigate CVE-2006-6618, update AntiHook to the latest version or use alternative security software with stronger process identification mechanisms.
CVE-2006-6618 affects users of AntiHook version 3.0.0.23 and other specific firewall software listed in the vulnerability description.
Attackers can exploit CVE-2006-6618 to bypass security controls on processes by spoofing process identification fields.
While CVE-2006-6618 was reported in 2006, its relevance depends on the continued use of outdated versions of affected software.