First published: Mon Dec 18 2006(Updated: )
Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Look 'n' Stop Firewall | =2.05p2 | |
AVG Antivirus Plus Firewall | =7.5.431 | |
Comodo Firewall Pro | =2.3.6.81 | |
Infoprocess Antihook | =3.0.23 | |
Sygate Technologies | =5.6.2808 | |
Filseclab Personal Firewall | =3.0.8686 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6620 has a medium severity rating due to its potential to allow local users to bypass security controls.
To fix CVE-2006-6620, update to a newer version of Comodo Personal Firewall or apply any available patches.
CVE-2006-6620 specifically targets vulnerabilities in Comodo Personal Firewall 2.3.6.81 and other products relying on the Process Environment Block.
CVE-2006-6620 cannot be exploited remotely as it requires local user access to perform the attack.
CVE-2006-6620 primarily affects systems running Comodo Personal Firewall 2.3.6.81, along with several other personal firewall applications.