First published: Mon Sep 24 2007(Updated: )
Outpost Firewall Pro 4.0.1025.7828 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via the (1) NtCreateKey, (2) NtDeleteFile, (3) NtLoadDriver, (4) NtOpenProcess, (5) NtOpenSection, (6) NtOpenThread, and (7) NtUnloadDriver kernel SSDT hooks, a partial regression of CVE-2006-7160.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Agnitum Outpost Firewall | =4.0.1025.7828 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5042 is classified as a medium severity vulnerability that can lead to a denial of service and potential privilege escalation.
To mitigate CVE-2007-5042, users should upgrade to a patched version of Outpost Firewall Pro or consider using an alternative firewall solution.
CVE-2007-5042 can be exploited through specific calls like NtCreateKey, NtDeleteFile, and NtLoadDriver, potentially resulting in a system crash.
CVE-2007-5042 affects users of Outpost Firewall Pro version 4.0.1025.7828 and could impact local user security.
If affected by CVE-2007-5042, users may experience denial of service and could potentially gain elevated privileges on the system.