cvelist/2007/0xxx/CVE-2007-0333.json
2019-03-17 23:31:35 +00:00

87 lines
2.9 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0333",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070115 Outpost Bypassing Self-Protection using file links Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/456973/100/0/threaded"
},
{
"name": "http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php",
"refsource": "MISC",
"url": "http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php"
},
{
"name": "22069",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22069"
},
{
"name": "33480",
"refsource": "OSVDB",
"url": "http://osvdb.org/33480"
},
{
"name": "2163",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2163"
},
{
"name": "outpostfirewall-zwset-privilege-escalation(31529)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31529"
}
]
}
}