CVE-2009-2450
Published Jul 13, 2009
Last updated 7 years ago
Overview
- Description
- The OAmon.sys kernel driver 3.1.0.0 and earlier in Tall Emu Online Armor Personal Firewall AV+ before 3.5.0.12, and Personal Firewall 3.5 before 3.5.0.14, allows local users to gain privileges via crafted METHOD_NEITHER IOCTL requests to \Device\OAmon containing arbitrary kernel addresses, as demonstrated using the 0x830020C3 IOCTL.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tallemu:online_armor_personal_firewall_av\\+:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AD4AE7A-E4CB-42C1-A11A-FC6D508F147A", "versionEndIncluding": "3.5.0.11" }, { "criteria": "cpe:2.3:a:tallemu:online_armor_personal_firewall_av\\+:3.5.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E8DADE9-DBA9-44C9-8DC1-940804060CF7" }, { "criteria": "cpe:2.3:a:tallemu:online_armor_personal_firewall_av\\+:3.5.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C63A08-EDE7-4CC6-A23D-07CEB0805CB2" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D305E959-469D-42E0-83C1-AD73A94C647F", "versionEndIncluding": "3.5.0.13" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77A31AE5-6BDD-444C-A10C-E84F32EFE4E3" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61A9DD13-00EE-4DCA-819A-EE4BC4E0F306" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4BD2C55-AEA8-4700-89F5-2A9BEA2DA37F" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A514514E-F2BA-4B23-820C-7AA6B284042B" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81A19ED6-9DF9-49B6-88E2-B2BE30FBDF17" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3658D72E-413B-489E-9D4C-262B15160D30" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BDC5F53-D51F-4801-87BE-EE253DB80D63" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2123F5D-A418-4657-816D-D97BF6A1ADDA" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3665144-A936-4EFA-BB97-E3436B5BFD7A" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DA3E5BB-5BBE-4565-9417-34B3BDA08349" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "882FC0D5-B40E-4F5C-8999-03C10E8624B3" }, { "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "862734C7-284F-43F3-9658-F6604FAD5746" } ], "operator": "OR" } ] } ]