ID

VAR-200709-0265


CVE

CVE-2007-4968


TITLE

Privatefirewall Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-006119

DESCRIPTION

Privatefirewall 5.0.14.2 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via kernel SSDT hooks for (1) NtOpenProcess and (2) NtOpenThread. Privatefirewall is prone to multiple local vulnerabilities. Exploiting these vulnerabilities allows local attackers to crash affected computers, denying service to legitimate users. Attackers might also be able to gain elevated privileges by executing arbitrary machine code in the context of the kernel, but this has not been confirmed. Privatefirewall 5.0.14.2 is vulnerable; other versions may also be affected

Trust: 1.98

sources: NVD: CVE-2007-4968 // JVNDB: JVNDB-2007-006119 // BID: 25712 // VULHUB: VHN-28330

AFFECTED PRODUCTS

vendor:privacywaremodel:privatefirewallscope:eqversion:5.0.14.2

Trust: 1.9

vendor:pwimodel:privatefirewallscope:eqversion:5.0.14.2

Trust: 0.8

sources: BID: 25712 // JVNDB: JVNDB-2007-006119 // CNNVD: CNNVD-200709-249 // NVD: CVE-2007-4968

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4968
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-4968
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200709-249
value: MEDIUM

Trust: 0.6

VULHUB: VHN-28330
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-4968
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28330
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28330 // JVNDB: JVNDB-2007-006119 // CNNVD: CNNVD-200709-249 // NVD: CVE-2007-4968

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-28330 // JVNDB: JVNDB-2007-006119 // NVD: CVE-2007-4968

THREAT TYPE

local

Trust: 0.9

sources: BID: 25712 // CNNVD: CNNVD-200709-249

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200709-249

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-006119

PATCH

title:Top Pageurl:http://www.privacyware.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-006119

EXTERNAL IDS

db:NVDid:CVE-2007-4968

Trust: 2.8

db:BIDid:25712

Trust: 2.0

db:OSVDBid:45952

Trust: 1.7

db:JVNDBid:JVNDB-2007-006119

Trust: 0.8

db:BUGTRAQid:20070918 PLAGUE IN (SECURITY) SOFTWARE DRIVERS & BSDOHOOK UTILITY

Trust: 0.6

db:CNNVDid:CNNVD-200709-249

Trust: 0.6

db:VULHUBid:VHN-28330

Trust: 0.1

sources: VULHUB: VHN-28330 // BID: 25712 // JVNDB: JVNDB-2007-006119 // CNNVD: CNNVD-200709-249 // NVD: CVE-2007-4968

REFERENCES

url:http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php

Trust: 2.0

url:http://www.securityfocus.com/bid/25712

Trust: 1.7

url:http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php

Trust: 1.7

url:http://osvdb.org/45952

Trust: 1.7

url:http://www.securityfocus.com/archive/1/479830/100/0/threaded

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4968

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4968

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/479830/100/0/threaded

Trust: 0.6

url:http://www.privacyware.com/index.html

Trust: 0.3

url:/archive/1/479830

Trust: 0.3

sources: VULHUB: VHN-28330 // BID: 25712 // JVNDB: JVNDB-2007-006119 // CNNVD: CNNVD-200709-249 // NVD: CVE-2007-4968

CREDITS

Matousec Transparent Security Research discovered these vulnerabilities.

Trust: 0.3

sources: BID: 25712

SOURCES

db:VULHUBid:VHN-28330
db:BIDid:25712
db:JVNDBid:JVNDB-2007-006119
db:CNNVDid:CNNVD-200709-249
db:NVDid:CVE-2007-4968

LAST UPDATE DATE

2025-04-10T23:01:05.484000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28330date:2018-10-15T00:00:00
db:BIDid:25712date:2015-05-07T17:35:00
db:JVNDBid:JVNDB-2007-006119date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200709-249date:2007-09-26T00:00:00
db:NVDid:CVE-2007-4968date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-28330date:2007-09-19T00:00:00
db:BIDid:25712date:2007-09-18T00:00:00
db:JVNDBid:JVNDB-2007-006119date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200709-249date:2007-09-18T00:00:00
db:NVDid:CVE-2007-4968date:2007-09-19T01:17:00