Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Comodo Internet Security Kernel Hook "Argument Switching" Securit...

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
Comodo Internet Security Kernel Hook "Argument Switching" Security Bypass

Secunia Comodo Internet Security Kernel Hook "Argument Switching" Security Bypass
Secunia Official 10th Jun, 2010 04:53
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
A weakness has been reported in Comodo Internet Security, which can be exploited by malicious, local users to bypass certain security features.

The weakness is caused due to the application not properly implementing security checks in certain kernel hooks, which can be exploited to bypass those checks by changing the arguments after the check but prior to their use by the system call.

jj_four RE: Comodo Internet Security Kernel Hook "Argument Switching" Security Bypass
Member 10th Jun, 2010 04:53
Score: 0
Posts: 1
User Since: 10th Jun 2010
System Score: N/A
Location: US
Last edited on 10th Jun, 2010 04:53
cpf.exe is falsely reported as being insecure and needing to be updated but the product version is 4.1.149672.916 and one of its two file version attributes is also 4.1.149672.916.
Was this reply relevant?
+0
-0
Anthony Wells RE: Comodo Internet Security Kernel Hook "Argument Switching" Security Bypass
Expert Contributor 10th Jun, 2010 12:30
Score: 2445
Posts: 3,336
User Since: 19th Dec 2007
System Score: N/A
Location: N/A

@jj_four ,

As you are a new member of the Community Forum , allow me to advise you that your problem/comments are not actually relevant to the Secunia Advisory itself ; where you posted is reserved for technical input concerning the vulnerability itself .

Another thread in the "programs" sub-forum is already dealing with your query , so you are best advised to continue in that thread :-

http://secunia.com/community/forum/thread/show/445...

Take care
Anthony

--


It always seems impossible until its done.
Nelson Mandela
Was this reply relevant?
+1
-0


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer