CVE-2006-5153
Published Oct 5, 2006
Last updated 6 years ago
Overview
- Description
- The (1) fwdrv.sys and (2) khips.sys drivers in Sunbelt Kerio Personal Firewall 4.3.268 and earlier do not validate arguments passed through to SSDT functions, including NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile, which allows local users to cause a denial of service (crash) and possibly other impacts via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6C66920-4A4F-4335-B052-44E1F92F585B" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "658F01AE-C211-473C-BF70-E524E4310F20" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F769FAE-CC31-4C8B-B785-1423DFC2BA3B" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB7202BC-AD0B-41B1-B7C1-7665498C967B" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38E60288-F9E6-4E7C-9B48-352277A34C85" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32087795-35B4-427A-BDAE-F0A217230C18" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C04B63F-3715-46F1-917E-5185691BD619" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B1A9450-D6E7-4D0A-A9BF-E64284D1E1CC" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "041B4428-ADC5-4BD2-9F6E-0BE2362FD9B3" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E19F4EE-1567-4CD8-895C-474CE80241AD" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19EA5978-64EC-4B54-BC06-20324DB0E6CC" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2B9D00A-6598-4BC0-B058-7598657274D8" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F81E1EDB-A491-4BE6-B6DE-1C4A695EE1F8" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C076C7D-D833-42CF-9FEF-F3654013AB05" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FEB6DB5-851E-4EDF-AC1C-CBA502C6D5A4" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6682610C-1564-48E3-A364-76B6F5369F02" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.3.246:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "651BA95B-3298-459C-9141-B8D3E8532FF3" }, { "criteria": "cpe:2.3:a:kerio:personal_firewall:4.3.268:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26B05B51-14DB-4ADF-8AA1-8D4E5C2956DF" } ], "operator": "OR" } ] } ]