GHSA-26Q6-82CC-W6FM
Vulnerability from github – Published: 2022-05-01 07:11 – Updated: 2022-05-01 07:11
VLAI?
Details
Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allows local users to gain privileges and execute commands (a) via the "open folder" option when no instance of explorer.exe is running, possibly related to the ShellExecute API function; or (b) by overwriting a batch file through the "Save Configuration As" option. NOTE: this might be a vulnerability in Microsoft Windows and explorer.exe instead of the firewall.
{
"affected": [],
"aliases": [
"CVE-2006-3697"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2006-07-21T14:03:00Z",
"severity": "HIGH"
},
"details": "Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allows local users to gain privileges and execute commands (a) via the \"open folder\" option when no instance of explorer.exe is running, possibly related to the ShellExecute API function; or (b) by overwriting a batch file through the \"Save Configuration As\" option. NOTE: this might be a vulnerability in Microsoft Windows and explorer.exe instead of the firewall.",
"id": "GHSA-26q6-82cc-w6fm",
"modified": "2022-05-01T07:11:38Z",
"published": "2022-05-01T07:11:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3697"
},
{
"type": "WEB",
"url": "https://secure-support.novell.com/KanisaPlatform/Publishing/903/3762108_f.SAL_Public.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21088"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21089"
},
{
"type": "WEB",
"url": "http://www.ben.goulding.com.au/secad.html"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/27349"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/440426/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/19018"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/19024"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2006/2851"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2006/2852"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/0144"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…