First published: Mon Dec 18 2006(Updated: )
Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AVG Antivirus | =7.5.431 | |
Comodo Firewall Pro | =2.3.6.81 | |
Filseclab Personal Firewall | =3.0.8686 | |
Infoprocess Antihook | =3.0.23 | |
Look 'n' Stop Firewall | =2.05p2 | |
Sygate Technologies | =5.6.2808 | |
=7.5.431 | ||
=2.3.6.81 | ||
=3.0.8686 | ||
=3.0.23 | ||
=2.05p2 | ||
=5.6.2808 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6621 is considered a medium severity vulnerability due to its potential to allow local users to bypass security controls.
To mitigate CVE-2006-6621, it is recommended to update Filseclab Personal Firewall to the latest version or apply any available patches.
CVE-2006-6621 affects Filseclab Personal Firewall 3.0.0.8686 and several other personal firewalls like Comodo Personal Firewall and Sygate Personal Firewall.
CVE-2006-6621 enables local users to spoof process identification, which can be exploited to bypass firewall protections.
CVE-2006-6621 is not remotely exploitable as it requires local user access to exploit the vulnerability.