CVE-2009-2450
13.07.2009, 17:30
The OAmon.sys kernel driver 3.1.0.0 and earlier in Tall Emu Online Armor Personal Firewall AV+ before 3.5.0.12, and Personal Firewall 3.5 before 3.5.0.14, allows local users to gain privileges via crafted METHOD_NEITHER IOCTL requests to \Device\OAmon containing arbitrary kernel addresses, as demonstrated using the 0x830020C3 IOCTL.Enginsight
Vendor | Product | Version |
---|---|---|
tallemu | online_armor_personal_firewall_av\+ | 𝑥 ≤ 3.5.0.11 |
tallemu | online_armor_personal_firewall_av\+ | 3.5.0.6 |
tallemu | online_armor_personal_firewall_av\+ | 3.5.0.9 |
tallemu | personal_firewall | 𝑥 ≤ 3.5.0.13 |
tallemu | personal_firewall | 3.5.0.1 |
tallemu | personal_firewall | 3.5.0.2 |
tallemu | personal_firewall | 3.5.0.3 |
tallemu | personal_firewall | 3.5.0.4 |
tallemu | personal_firewall | 3.5.0.5 |
tallemu | personal_firewall | 3.5.0.6 |
tallemu | personal_firewall | 3.5.0.7 |
tallemu | personal_firewall | 3.5.0.8 |
tallemu | personal_firewall | 3.5.0.9 |
tallemu | personal_firewall | 3.5.0.10 |
tallemu | personal_firewall | 3.5.0.11 |
tallemu | personal_firewall | 3.5.0.12 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References