Vulnerability Name:

CVE-2014-4973 (CCN-95381)

Assigned:2014-08-20
Published:2014-08-20
Updated:2014-09-24
Summary:The ESET Personal Firewall NDIS filter (EpFwNdis.sys) driver in the Firewall Module Build 1183 (20140214) and earlier in ESET Smart Security and ESET Endpoint Security products 5.0 through 7.0 allows local users to gain privileges via a crafted argument to a 0x830020CC IOCTL call.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.1 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Wed Aug 20 2014 - 05:24:59 CDT
CVE-2014-4973 - Privilege Escalation in ESET Windows Products

Source: MITRE
Type: CNA
CVE-2014-4973

Source: FULLDISC
Type: UNKNOWN
20140820 CVE-2014-4973 - Privilege Escalation in ESET Windows Products

Source: CCN
Type: ESET Web site
Personal Firewall

Source: CCN
Type: BID-69294
Multiple ESET Products CVE-2014-4973 Heap Overflow Vulnerability

Source: XF
Type: UNKNOWN
eset-cve20144973-priv-esc(95381)

Source: MISC
Type: Exploit
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4973/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:eset:smart_security:5.0.94:*:*:*:*:*:*:*
  • OR cpe:/a:eset:smart_security:5.0.95:*:*:*:*:*:*:*
  • OR cpe:/a:eset:smart_security:5.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:eset:smart_security:5.2.15:*:*:*:*:*:*:*
  • OR cpe:/a:eset:smart_security:6.0.306:*:*:*:*:*:*:*
  • OR cpe:/a:eset:smart_security:6.0.308:*:*:*:*:*:*:*
  • OR cpe:/a:eset:smart_security:6.0.314:*:*:*:*:*:*:*
  • OR cpe:/a:eset:smart_security:6.0.316:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:eset:endpoint_security:5.0.2113:*:*:*:*:*:*:*
  • OR cpe:/a:eset:endpoint_security:5.0.2122:*:*:*:*:*:*:*
  • OR cpe:/a:eset:endpoint_security:5.0.2126:*:*:*:*:*:*:*
  • OR cpe:/a:eset:endpoint_security:5.0.2214:*:*:*:*:*:*:*
  • OR cpe:/a:eset:endpoint_security:5.0.2225:*:*:*:*:*:*:*
  • OR cpe:/a:eset:endpoint_security:5.0.2228:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    eset smart security 5.0.94
    eset smart security 5.0.95
    eset smart security 5.2.9
    eset smart security 5.2.15
    eset smart security 6.0.306
    eset smart security 6.0.308
    eset smart security 6.0.314
    eset smart security 6.0.316
    eset endpoint security 5.0.2113
    eset endpoint security 5.0.2122
    eset endpoint security 5.0.2126
    eset endpoint security 5.0.2214
    eset endpoint security 5.0.2225
    eset endpoint security 5.0.2228