{ "id": "CVE-2009-2450", "sourceIdentifier": "cve@mitre.org", "published": "2009-07-13T17:30:00.343", "lastModified": "2024-11-21T01:04:54.107", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The OAmon.sys kernel driver 3.1.0.0 and earlier in Tall Emu Online Armor Personal Firewall AV+ before 3.5.0.12, and Personal Firewall 3.5 before 3.5.0.14, allows local users to gain privileges via crafted METHOD_NEITHER IOCTL requests to \\Device\\OAmon containing arbitrary kernel addresses, as demonstrated using the 0x830020C3 IOCTL." }, { "lang": "es", "value": "El controlador del kernel OAmon.sys v 3.1.0.0 y anteriores en Tall Emu Online Armor Personal Firewall AV+ anterior a v3.5.0.12, y Personal Firewall 3.5 anterior a v3.5.0.14, permite a usuarios locales obtener privilegios a trav\u00e9s de peticiones METHOD_NEITHER IOCTL modificadas a \\Device\\OAmon que contienen direcciones del kernel de su elecci\u00f3n como se ha demostrado empleadon el IOCTL 0x830020C3." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:online_armor_personal_firewall_av\\+:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.5.0.11", "matchCriteriaId": "3AD4AE7A-E4CB-42C1-A11A-FC6D508F147A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:online_armor_personal_firewall_av\\+:3.5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5E8DADE9-DBA9-44C9-8DC1-940804060CF7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:online_armor_personal_firewall_av\\+:3.5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3C63A08-EDE7-4CC6-A23D-07CEB0805CB2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.5.0.13", "matchCriteriaId": "D305E959-469D-42E0-83C1-AD73A94C647F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "77A31AE5-6BDD-444C-A10C-E84F32EFE4E3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "61A9DD13-00EE-4DCA-819A-EE4BC4E0F306" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A4BD2C55-AEA8-4700-89F5-2A9BEA2DA37F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A514514E-F2BA-4B23-820C-7AA6B284042B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "81A19ED6-9DF9-49B6-88E2-B2BE30FBDF17" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3658D72E-413B-489E-9D4C-262B15160D30" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "6BDC5F53-D51F-4801-87BE-EE253DB80D63" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "F2123F5D-A418-4657-816D-D97BF6A1ADDA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3665144-A936-4EFA-BB97-E3436B5BFD7A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "8DA3E5BB-5BBE-4565-9417-34B3BDA08349" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "882FC0D5-B40E-4F5C-8999-03C10E8624B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:tallemu:personal_firewall:3.5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "862734C7-284F-43F3-9658-F6604FAD5746" } ] } ] } ], "references": [ { "url": "http://milw0rm.com/sploits/2009-OAmon_Exp.zip", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.exploit-db.com/exploits/8875", "source": "cve@mitre.org" }, { "url": "http://www.ntinternals.org/ntiadv0806/ntiadv0806.html", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/35227", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50960", "source": "cve@mitre.org" }, { "url": "http://milw0rm.com/sploits/2009-OAmon_Exp.zip", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://www.exploit-db.com/exploits/8875", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.ntinternals.org/ntiadv0806/ntiadv0806.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/35227", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50960", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }