cvelist/2007/0xxx/CVE-2007-0333.json

87 lines
2.9 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 23:31:35 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0333",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 23:31:35 +00:00
"lang": "eng",
"value": "Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys."
2017-10-16 12:31:07 -04:00
}
2019-03-17 23:31:35 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070115 Outpost Bypassing Self-Protection using file links Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456973/100/0/threaded"
},
{
"name": "http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php",
"refsource": "MISC",
"url": "http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php"
},
{
"name": "22069",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22069"
},
{
"name": "33480",
"refsource": "OSVDB",
"url": "http://osvdb.org/33480"
},
{
"name": "2163",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2163"
},
{
"name": "outpostfirewall-zwset-privilege-escalation(31529)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31529"
}
]
}
}