First published: Wed May 16 2007(Updated: )
Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | ||
Microsoft Windows Server 2003 | ||
Microsoft Windows XP | ||
Alarm | <=6.1.744.001 | |
Comodo Firewall Pro | =2.4.18.184 | |
Comodo Firewall Pro | =2.3.6.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2730 allows local users to bypass firewall rules and gain elevated privileges due to inadequate process identifier checks.
CVE-2007-2730 affects Check Point ZoneAlarm Pro versions prior to 6.5.737.000.
To mitigate the risk of CVE-2007-2730, upgrade to Check Point ZoneAlarm Pro version 6.5.737.000 or later.
Yes, also affected are specific versions of Comodo Firewalls, including Comodo Firewall Pro 2.4.18.184 and Comodo Personal Firewall 2.3.6.81.
CVE-2007-2730 affects systems running Microsoft Windows XP, Windows 2000, and Windows 2003 Server, but it is primarily linked to the legacy Check Point ZoneAlarm Pro software.