ID

VAR-201411-0062


CVE

CVE-2014-4974


TITLE

plural ESET Used in products ESET Personal Firewall NDIS Vulnerability in the acquisition of important information in the filter kernel mode driver

Trust: 0.8

sources: JVNDB: JVNDB-2014-005235

DESCRIPTION

The ESET Personal Firewall NDIS filter (EpFwNdis.sys) kernel mode driver, aka Personal Firewall module before Build 1212 (20140609), as used in multiple ESET products 5.0 through 7.0, allows local users to obtain sensitive information from kernel memory via crafted IOCTL calls. Multiple ESET Products are prone to a local information-disclosure vulnerability. Local attackers can exploit this issue to obtain sensitive information. Information obtained may lead to further attacks. Both ESET Smart Security and ESET Endpoint Security are security package solutions from ESET in Slovakia, which include functions such as virus defense and cleaning, anti-spam and firewall; the former is the home version, and the latter is the business version. The vulnerability is caused by improper validation for some IOCTLs. Further details at: https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4974/ Copyright: Copyright (c) Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited. Disclaimer: The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information. ############################################################### This email originates from the systems of Portcullis Computer Security Limited, a Private limited company, registered in England in accordance with the Companies Act under number 02763799. The registered office address of Portcullis Computer Security Limited is: Portcullis House, 2 Century Court, Tolpits Lane, Watford, United Kingdom, WD18 9RS. The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Any opinions expressed are those of the individual and do not represent the opinion of the organisation. Access to this email by persons other than the intended recipient is strictly prohibited. If you are not the intended recipient, any disclosure, copying, distribution or other action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email is subject to the terms and conditions expressed in the applicable Portcullis Computer Security Limited terms of business. ############################################################### ##################################################################################### This e-mail message has been scanned for Viruses and Content and cleared by MailMarshal. #####################################################################################

Trust: 2.07

sources: NVD: CVE-2014-4974 // JVNDB: JVNDB-2014-005235 // BID: 70770 // VULHUB: VHN-72915 // PACKETSTORM: 128874

AFFECTED PRODUCTS

vendor:esetmodel:personal firewall ndis filterscope:lteversion:1183_\(20140214\)

Trust: 1.0

vendor:esetmodel:personal firewall ndis filterscope:ltversion:build 1212 (20140609)

Trust: 0.8

vendor:esetmodel:personal firewall ndis filterscope:eqversion:1183_\(20140214\)

Trust: 0.6

vendor:esetmodel:smart securityscope:eqversion:0

Trust: 0.3

vendor:esetmodel:personal firewall module buildscope:eqversion:1183(20140214

Trust: 0.3

vendor:esetmodel:endpoint securityscope:eqversion:0

Trust: 0.3

vendor:esetmodel:personal firewall module buildscope:neversion:1212(20140609

Trust: 0.3

sources: BID: 70770 // JVNDB: JVNDB-2014-005235 // CNNVD: CNNVD-201410-1369 // NVD: CVE-2014-4974

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-4974
value: LOW

Trust: 1.0

NVD: CVE-2014-4974
value: LOW

Trust: 0.8

CNNVD: CNNVD-201410-1369
value: LOW

Trust: 0.6

VULHUB: VHN-72915
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2014-4974
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-72915
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-72915 // JVNDB: JVNDB-2014-005235 // CNNVD: CNNVD-201410-1369 // NVD: CVE-2014-4974

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-72915 // JVNDB: JVNDB-2014-005235 // NVD: CVE-2014-4974

THREAT TYPE

local

Trust: 0.9

sources: BID: 70770 // CNNVD: CNNVD-201410-1369

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201410-1369

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005235

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-72915

PATCH

title:Top Pageurl:http://www.eset.com/us/

Trust: 0.8

title:Windows用プログラムのパーソナルファイアウォール機能に関する脆弱性(JVNDB-2014-005235)への対応状況についてurl:http://canon-its.jp/supp/eset/notify20141118.html

Trust: 0.8

sources: JVNDB: JVNDB-2014-005235

EXTERNAL IDS

db:NVDid:CVE-2014-4974

Trust: 2.9

db:BIDid:70770

Trust: 2.0

db:PACKETSTORMid:128874

Trust: 1.8

db:JVNDBid:JVNDB-2014-005235

Trust: 0.8

db:CNNVDid:CNNVD-201410-1369

Trust: 0.7

db:XFid:98312

Trust: 0.6

db:VULHUBid:VHN-72915

Trust: 0.1

sources: VULHUB: VHN-72915 // BID: 70770 // JVNDB: JVNDB-2014-005235 // PACKETSTORM: 128874 // CNNVD: CNNVD-201410-1369 // NVD: CVE-2014-4974

REFERENCES

url:https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4974/

Trust: 2.9

url:http://www.securityfocus.com/bid/70770

Trust: 1.7

url:http://seclists.org/fulldisclosure/2014/oct/118

Trust: 1.7

url:http://packetstormsecurity.com/files/128874/eset-7.0-kernel-memory-leak.html

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/98312

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4974

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4974

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/98312

Trust: 0.6

url:http://www.eset.com/smartsecurity/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4974

Trust: 0.1

sources: VULHUB: VHN-72915 // BID: 70770 // JVNDB: JVNDB-2014-005235 // PACKETSTORM: 128874 // CNNVD: CNNVD-201410-1369 // NVD: CVE-2014-4974

CREDITS

Kyriakos Economou

Trust: 1.0

sources: BID: 70770 // PACKETSTORM: 128874 // CNNVD: CNNVD-201410-1369

SOURCES

db:VULHUBid:VHN-72915
db:BIDid:70770
db:JVNDBid:JVNDB-2014-005235
db:PACKETSTORMid:128874
db:CNNVDid:CNNVD-201410-1369
db:NVDid:CVE-2014-4974

LAST UPDATE DATE

2025-04-13T23:39:08.886000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-72915date:2017-08-29T00:00:00
db:BIDid:70770date:2014-10-22T00:00:00
db:JVNDBid:JVNDB-2014-005235date:2014-12-02T00:00:00
db:CNNVDid:CNNVD-201410-1369date:2014-12-01T00:00:00
db:NVDid:CVE-2014-4974date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-72915date:2014-11-04T00:00:00
db:BIDid:70770date:2014-10-22T00:00:00
db:JVNDBid:JVNDB-2014-005235date:2014-11-06T00:00:00
db:PACKETSTORMid:128874date:2014-10-28T18:13:16
db:CNNVDid:CNNVD-201410-1369date:2014-10-29T00:00:00
db:NVDid:CVE-2014-4974date:2014-11-04T16:55:06.450