CVE-2007-2730
Summary
| CVE | CVE-2007-2730 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-05-16 22:30:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Check Point ZoneAlarm Pro before 6.5.737.000 does not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier. |
Risk And Classification
Primary CVSS: v2.0 7.2 from [email protected]
AV:L/AC:L/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Checkpoint | Zonealarm | All | All | All | All |
| Application | Comodo | Comodo Firewall Pro | 2.4.18.184 | All | All | All |
| Application | Comodo | Comodo Personal Firewall | 2.3.6.81 | All | All | All |
| Operating System | Microsoft | Windows 2000 | All | All | All | All |
| Operating System | Microsoft | Windows 2003 Server | All | All | All | All |
| Operating System | Microsoft | Windows Xp | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Bypassing PFW/HIPS open process control with uncommon identifier - CXSecurity.com | af854a3a-2127-422b-91ae-364da2661108 | securityreason.com | |
| osvdb.org/37383 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| Advisory 2007-05-01.01 - matousec.com | af854a3a-2127-422b-91ae-364da2661108 | www.matousec.com | Vendor Advisory |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.