First published: Tue Sep 23 2014(Updated: )
The ESET Personal Firewall NDIS filter (EpFwNdis.sys) driver in the Firewall Module Build 1183 (20140214) and earlier in ESET Smart Security and ESET Endpoint Security products 5.0 through 7.0 allows local users to gain privileges via a crafted argument to a 0x830020CC IOCTL call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ESET Smart Security for Windows | =5.0.94 | |
ESET Smart Security for Windows | =5.0.95 | |
ESET Smart Security for Windows | =5.2.9 | |
ESET Smart Security for Windows | =5.2.15 | |
ESET Smart Security for Windows | =6.0.306 | |
ESET Smart Security for Windows | =6.0.308 | |
ESET Smart Security for Windows | =6.0.314 | |
ESET Smart Security for Windows | =6.0.316 | |
Seqrite End Point Security | =5.0.2113 | |
Seqrite End Point Security | =5.0.2122 | |
Seqrite End Point Security | =5.0.2126 | |
Seqrite End Point Security | =5.0.2214 | |
Seqrite End Point Security | =5.0.2225 | |
Seqrite End Point Security | =5.0.2228 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4973 has a medium severity level due to its potential for local privilege escalation.
To mitigate CVE-2014-4973, update to the latest version of ESET Smart Security or ESET Endpoint Security that addresses this vulnerability.
CVE-2014-4973 affects ESET Smart Security versions 5.0 through 7.0 and ESET Endpoint Security versions 5.0.x.
CVE-2014-4973 cannot be exploited remotely as it requires local user access to exploit the vulnerability.
CVE-2014-4973 affects the ESET Personal Firewall NDIS filter driver (EpFwNdis.sys).