The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Outpost Firewall: denial of service via outpost_ipc_hdr

Synthesis of the vulnerability 

A local attacker can use the outpost_ipc_hdr mutex in order to block Outpost Firewall, and to force victim to restart system.
Impacted systems: Outpost Firewall.
Severity of this alert: 1/4.
Creation date: 04/06/2007.
Références of this alert: BID-24284, CVE-2007-3086, VIGILANCE-VUL-6869.

Description of the vulnerability 

The Outpost firewall uses the \BaseNamedObjects\outpost_ipc_hdr mutex when a potentially dangerous operation is conducted on the system.

However, a non privileged process can use this mutex (lock), then achieve a malicious operation, which locks Outpost. Victim then has to restart system.

This vulnerability therefore permits a local attacker to create a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer threat announce impacts software or systems such as Outpost Firewall.

Our Vigil@nce team determined that the severity of this computer vulnerability is low.

The trust level is of type confirmed by a trusted third party, with an origin of user shell.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this cybersecurity alert.

Solutions for this threat 

Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an applications vulnerabilities bulletin. The technology watch team tracks security threats targeting the computer system.