First published: Wed Mar 07 2007(Updated: )
The Sandbox.sys driver in Outpost Firewall PRO 4.0, and possibly earlier versions, does not validate arguments to hooked SSDT functions, which allows local users to cause a denial of service (crash) via invalid arguments to the (1) NtAssignProcessToJobObject,, (2) NtCreateKey, (3) NtCreateThread, (4) NtDeleteFile, (5) NtLoadDriver, (6) NtOpenProcess, (7) NtProtectVirtualMemory, (8) NtReplaceKey, (9) NtTerminateProcess, (10) NtTerminateThread, (11) NtUnloadDriver, and (12) NtWriteVirtualMemory functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Agnitum Outpost Firewall | <=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-7160 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2006-7160, update to a version of Agnitum Outpost Firewall PRO later than 4.0 that addresses this vulnerability.
CVE-2006-7160 affects local users of Outpost Firewall PRO 4.0 and possibly earlier versions.
The impact of CVE-2006-7160 is the potential for local users to crash the system by sending invalid arguments to specific functions.
CVE-2006-7160 is not exploitable remotely as it requires local user access to trigger the vulnerability.