Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.
Link | Tags |
---|---|
http://www.security.org.sg/vuln/kerio4016.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17270 | vdb entry |
http://www.securityfocus.com/bid/11096 | exploit vdb entry vendor advisory |
http://secunia.com/advisories/12468/ | third party advisory vendor advisory |
http://marc.info/?l=bugtraq&m=109420310631039&w=2 | mailing list |