Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xwjp-hc68-95rc

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 4.8

Описание

** DISPUTED ** Race condition in PrivateFirewall 7.0.20.37 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute.

** DISPUTED ** Race condition in PrivateFirewall 7.0.20.37 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute.

EPSS

Процентиль: 6%
0.00027
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 4.8
nvd
почти 13 лет назад

Race condition in PrivateFirewall 7.0.20.37 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute

EPSS

Процентиль: 6%
0.00027
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-362