157 lines
4.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2004-1658",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-09-02T04:00:00.000",
"lastModified": "2024-11-20T23:51:25.940",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \\device\\physicalmemory to restore the running kernel's SDT ServiceTable."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 4.6,
2023-04-24 12:24:31 +02:00
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C66920-4A4F-4335-B052-44E1F92F585B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "658F01AE-C211-473C-BF70-E524E4310F20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1F769FAE-CC31-4C8B-B785-1423DFC2BA3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7202BC-AD0B-41B1-B7C1-7665498C967B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "38E60288-F9E6-4E7C-9B48-352277A34C85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "19EA5978-64EC-4B54-BC06-20324DB0E6CC"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=109420310631039&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/12468/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.security.org.sg/vuln/kerio4016.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/11096",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17270",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=109420310631039&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/12468/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.security.org.sg/vuln/kerio4016.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/11096",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17270",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}