CVE-2009-2450

The OAmon.sys kernel driver 3.1.0.0 and earlier in Tall Emu Online Armor Personal Firewall AV+ before 3.5.0.12, and Personal Firewall 3.5 before 3.5.0.14, allows local users to gain privileges via crafted METHOD_NEITHER IOCTL requests to \Device\OAmon containing arbitrary kernel addresses, as demonstrated using the 0x830020C3 IOCTL.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.2 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 29%
VendorProductVersion
tallemuonline_armor_personal_firewall_av\+
𝑥
≤ 3.5.0.11
tallemuonline_armor_personal_firewall_av\+
3.5.0.6
tallemuonline_armor_personal_firewall_av\+
3.5.0.9
tallemupersonal_firewall
𝑥
≤ 3.5.0.13
tallemupersonal_firewall
3.5.0.1
tallemupersonal_firewall
3.5.0.2
tallemupersonal_firewall
3.5.0.3
tallemupersonal_firewall
3.5.0.4
tallemupersonal_firewall
3.5.0.5
tallemupersonal_firewall
3.5.0.6
tallemupersonal_firewall
3.5.0.7
tallemupersonal_firewall
3.5.0.8
tallemupersonal_firewall
3.5.0.9
tallemupersonal_firewall
3.5.0.10
tallemupersonal_firewall
3.5.0.11
tallemupersonal_firewall
3.5.0.12
𝑥
= Vulnerable software versions