Vulnerability Name: | CVE-2008-5724 (CCN-47477) | ||||||||
Assigned: | 2008-12-16 | ||||||||
Published: | 2008-12-16 | ||||||||
Updated: | 2017-08-08 | ||||||||
Summary: | The Personal Firewall driver (aka epfw.sys) 3.0.672.0 and earlier in ESET Smart Security 3.0.672 and earlier allows local users to gain privileges via a crafted IRP in a certain METHOD_NEITHER IOCTL request to \Device\Epfw that overwrites portions of memory. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-5724 Source: CCN Type: SA33210 ESET Smart Security "epfw.sys" IOCTL Handler Privilege Escalation Source: SECUNIA Type: Vendor Advisory 33210 Source: CCN Type: ESET Web site Changelog for ESET Smart Security and NOD32 3.0: December 18, 2008 - 3.0.684 Source: CONFIRM Type: UNKNOWN http://www.eset.com/joomla/index.php?option=com_content&task=view&id=4113&Itemid=5 Source: CCN Type: NT Internals Advisory NTIADV0807 NT Internals - ESET Smart Security (epfw.sys) Privilege Escalation Vulnerability Source: MISC Type: UNKNOWN http://www.ntinternals.org/ntiadv0807/ntiadv0807.html Source: CCN Type: OSVDB ID: 50942 ESET Smart Security epfw.sys Crafted IRP METHOD_NEITHER IOCTL Handler Local Privilege Escalation Source: BID Type: UNKNOWN 32917 Source: CCN Type: BID-32917 ESET Smart Security 'epfw.sys' Local Privilege Escalation Vulnerability Source: VUPEN Type: UNKNOWN ADV-2008-3456 Source: XF Type: UNKNOWN smart-security-epfw-privilege-escalation(47477) Source: XF Type: UNKNOWN smart-security-epfw-privilege-escalation(47477) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |