7.2

CVE-2009-2450

Exploit
The OAmon.sys kernel driver 3.1.0.0 and earlier in Tall Emu Online Armor Personal Firewall AV+ before 3.5.0.12, and Personal Firewall 3.5 before 3.5.0.14, allows local users to gain privileges via crafted METHOD_NEITHER IOCTL requests to \Device\OAmon containing arbitrary kernel addresses, as demonstrated using the 0x830020C3 IOCTL.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
TallemuPersonal Firewall Version <= 3.5.0.13
TallemuPersonal Firewall Version3.5.0.1
TallemuPersonal Firewall Version3.5.0.2
TallemuPersonal Firewall Version3.5.0.3
TallemuPersonal Firewall Version3.5.0.4
TallemuPersonal Firewall Version3.5.0.5
TallemuPersonal Firewall Version3.5.0.6
TallemuPersonal Firewall Version3.5.0.7
TallemuPersonal Firewall Version3.5.0.8
TallemuPersonal Firewall Version3.5.0.9
TallemuPersonal Firewall Version3.5.0.10
TallemuPersonal Firewall Version3.5.0.11
TallemuPersonal Firewall Version3.5.0.12
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.32% 0.541
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.