ID SECURITYVULNS:VULN:7331
Type securityvulns
Reporter SECURITEAM
Modified 2007-03-02T00:00:00
Description
Application uses named pipe with changing, but predictable name which allows to manipulate protection settings.
{"id": "SECURITYVULNS:VULN:7331", "bulletinFamily": "software", "title": "Comodo Firewall protection bypass", "description": "Application uses named pipe with changing, but predictable name which allows to manipulate protection settings.", "published": "2007-03-02T00:00:00", "modified": "2007-03-02T00:00:00", "cvss": {"score": 4.4, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7331", "reporter": "SECURITEAM", "references": ["https://vulners.com/securityvulns/securityvulns:doc:16224"], "cvelist": ["CVE-2007-1330"], "type": "securityvulns", "lastseen": "2018-08-31T11:09:24", "edition": 1, "viewCount": 2, "enchantments": {"score": {"value": 5.5, "vector": "NONE", "modified": "2018-08-31T11:09:24", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-1330"]}, {"type": "exploitdb", "idList": ["EDB-ID:29695"]}, {"type": "osvdb", "idList": ["OSVDB:34957"]}, {"type": "kaspersky", "idList": ["KLA10122"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:16224"]}], "modified": "2018-08-31T11:09:24", "rev": 2}, "vulnersScore": 5.5}, "affectedSoftware": [{"name": "Comodo Firewall Pro", "operator": "eq", "version": "2.4"}, {"name": "Comodo Personal Firewall", "operator": "eq", "version": "2.3"}]}
{"cve": [{"lastseen": "2020-10-03T11:45:50", "description": "Comodo Firewall Pro (CFP) (formerly Comodo Personal Firewall) 2.4.18.184 and earlier allows local users to bypass driver protections on the HKLM\\SYSTEM\\Software\\Comodo\\Personal Firewall registry key by guessing the name of a named pipe under \\Device\\NamedPipe\\OLE and attempting to open it multiple times.", "edition": 3, "cvss3": {}, "published": "2007-03-07T21:19:00", "title": "CVE-2007-1330", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-1330"], "modified": "2018-10-16T16:37:00", "cpe": ["cpe:/a:comodo:comodo_firewall_pro:2.4.17.183", "cpe:/a:comodo:comodo_firewall_pro:2.4.18.184", "cpe:/a:comodo:comodo_firewall_pro:2.4.16.174"], "id": "CVE-2007-1330", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1330", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:comodo:comodo_firewall_pro:2.4.17.183:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_firewall_pro:2.4.16.174:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_firewall_pro:2.4.18.184:*:*:*:*:*:*:*"]}], "kaspersky": [{"lastseen": "2020-09-02T11:42:43", "bulletinFamily": "info", "cvelist": ["CVE-2007-1330"], "description": "### *Detect date*:\n03/07/2007\n\n### *Severity*:\nWarning\n\n### *Description*:\nAn unspecified vulnerability was found in Comodo Firewall Pro. By exploiting this vulnerability malicious users can bypass the driver protection for registry keys. This vulnerability can be exploited locally at a point related to OLE NamedPipe.\n\n### *Affected products*:\nComodo Firewall Pro versions 2.4.18.184 and earlier\n\n### *Solution*:\nUpdate to latest version\n\n### *Impacts*:\nSB \n\n### *Related products*:\n[Comodo Firewall Pro](<https://threats.kaspersky.com/en/product/Comodo-Firewall-Pro/>)\n\n### *CVE-IDS*:\n[CVE-2007-1330](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1330>)4.4Warning", "edition": 42, "modified": "2020-05-22T00:00:00", "published": "2007-03-07T00:00:00", "id": "KLA10122", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10122", "title": "\r KLA10122SB vulnerability in Comodo Firewall Pro ", "type": "kaspersky", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:31", "bulletinFamily": "software", "cvelist": ["CVE-2007-1330"], "description": "# No description provided by the source\n\n## References:\nOther Advisory URL: http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php\nMail List Post: http://seclists.org/bugtraq/2007/Mar/0003.html\nKeyword: formerly Comodo Personal Firewall\nISS X-Force ID: 32771\n[CVE-2007-1330](https://vulners.com/cve/CVE-2007-1330)\nBugtraq ID: 22775\n", "edition": 1, "modified": "2007-03-01T01:05:57", "published": "2007-03-01T01:05:57", "href": "https://vulners.com/osvdb/OSVDB:34957", "id": "OSVDB:34957", "title": "Comodo Firewall Pro (CFP) Named Pipe Prediction Driver Protection Bypass", "type": "osvdb", "cvss": {"score": 4.4, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-02-03T10:55:58", "description": "Comodo Firewall Pro 2.4.x Local Protection Mechanism Bypass Vulnerability. CVE-2007-1330. Local exploit for windows platform", "published": "2007-03-01T00:00:00", "type": "exploitdb", "title": "Comodo Firewall Pro 2.4.x - Local Protection Mechanism Bypass Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-1330"], "modified": "2007-03-01T00:00:00", "id": "EDB-ID:29695", "href": "https://www.exploit-db.com/exploits/29695/", "sourceData": "source: http://www.securityfocus.com/bid/22775/info\r\n\r\nComodo Firewall Pro is prone to a protection-mechanism-bypass vulnerability.\r\n\r\nExploiting this issue allows local attackers to bypass protection mechanisms implemented to restrict access to altering the firewall's configuration settings. This allows them to disable the firewall, aiding them in further attacks. \r\n\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/29695.zip", "cvss": {"score": 4.4, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/29695/"}]}