Kerio Personal Firewall v2xx Security Hole

This may be old news to many but I've just come across this find below.
It's worth a read even if you don't use Kerio v2xx..

Date: Jan 28 2004
Impact: Root access via local system
Exploit Included: Yes
Version(s): 2.x
Description: Johan Tuneld reported a vulnerability in the Kerio Personal Firewall version 2.x. A local user can run commands with SYSTEM privileges.

It is reported that a local user can use the administrative menus to run a copy of 'cmd.exe' with SYSTEM level privileges. A user can go to the Administration > Miscellaneous menu, select the 'Load' button, browse to 'c:\windows\system32\cmd.exe', right-click on 'cmd.exe', and then select 'Open' to open a command window with SYSTEM privileges.

A demonstration exploit screen shot is provided at:

http://www.tuneld.com/_images/other/kpf_system_privileges.png

If a firewall password is used, the local user must be authenticated to the firewall
before exploiting this flaw.

[Editor's note: The vulnerability reportedly applies to version 2. It is not clear if more recent versions of the firewall are also affected or not.]
Impact: A local user can open a Windows command window (cmd.exe) with SYSTEM privileges.
Solution: No solution was available at the time of this entry.
Vendor URL: www.kerio.com/kpf_home.html (Links to External Site)
Cause: Access control error
Underlying OS: Windows (Any)

Source
 
Cheers for the info bro :)

Seen this last night while browsing the kerio forum, i moved to outpost 2.1, it has a similar prob, but then it just lil ol me that uses my box :)

BaNzI :D
 
Top