First published: Mon Dec 18 2006(Updated: )
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AVG Antivirus Plus Firewall | =7.5.431 | |
Comodo Firewall Pro | =2.3.6.81 | |
Filseclab Personal Firewall | =3.0.8686 | |
Infoprocess Antihook | =3.0.23 | |
Look 'n' Stop Firewall | =2.05p2 | |
Sygate Technologies | =5.6.2808 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6619 is considered a high severity vulnerability due to its potential to bypass security controls.
To fix CVE-2006-6619, update to a newer version of AVG Anti-Virus plus Firewall that addresses this vulnerability.
CVE-2006-6619 affects AVG Anti-Virus plus Firewall version 7.5.431 and several other personal firewall products.
CVE-2006-6619 can facilitate local privilege escalation and allow attackers to bypass process controls.
CVE-2006-6619 can be exploited by local users with the ability to spoof environment block fields.