Описание
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:avg:antivirus_plus_firewall:7.5.431:*:*:*:*:*:*:*
cpe:2.3:a:comodo:comodo_personal_firewall:2.3.6.81:*:*:*:*:*:*:*
cpe:2.3:a:filseclab:personal_firewall:3.0.8686:*:*:*:*:*:*:*
cpe:2.3:a:infoprocess:antihook:3.0.23:*:*:*:*:*:*:*
cpe:2.3:a:soft4ever:look_n_stop:2.05p2:*:*:*:*:*:*:*
cpe:2.3:a:symantec:sygate_personal_firewall:5.6.2808:*:*:*:*:*:*:*
EPSS
Процентиль: 36%
0.00155
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
EPSS
Процентиль: 36%
0.00155
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other