CVE-2006-6623

Sygate Personal Firewall 5.6.2808 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:avg:antivirus_plus_firewall:7.5.431:*:*:*:*:*:*:*
cpe:2.3:a:comodo:comodo_personal_firewall:2.3.6.81:*:*:*:*:*:*:*
cpe:2.3:a:filseclab:personal_firewall:3.0.8686:*:*:*:*:*:*:*
cpe:2.3:a:infoprocess:antihook:3.0.23:*:*:*:*:*:*:*
cpe:2.3:a:soft4ever:look_n_stop:2.05p2:*:*:*:*:*:*:*
cpe:2.3:a:symantec:sygate_personal_firewall:5.6.2808:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-12-18 11:28

Updated : 2024-02-04 17:13


NVD link : CVE-2006-6623

Mitre link : CVE-2006-6623

CVE.ORG link : CVE-2006-6623


JSON object : View

Products Affected

comodo

  • comodo_personal_firewall

symantec

  • sygate_personal_firewall

avg

  • antivirus_plus_firewall

soft4ever

  • look_n_stop

infoprocess

  • antihook

filseclab

  • personal_firewall