{"api_version":"1","generated_at":"2026-05-13T04:43:16+00:00","cve":"CVE-2007-0333","urls":{"html":"https://cve.report/CVE-2007-0333","api":"https://cve.report/api/cve/CVE-2007-0333.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-0333","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-0333"},"summary":{"title":"CVE-2007-0333","description":"Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys.","state":"PUBLISHED","assigner":"mitre","published_at":"2007-01-18 02:28:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.2","severity":"","vector":"AV:L/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.securityfocus.com/bid/22069","name":"http://www.securityfocus.com/bid/22069","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Outpost Firewall PRO Local Privilege Escalation Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php","name":"http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Advisory 2007-01-15.01 - matousec.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://osvdb.org/33480","name":"http://osvdb.org/33480","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31529","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31529","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/2163","name":"http://securityreason.com/securityalert/2163","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityReason - Outpost Bypassing Self-Protection using file links Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/456973/100/0/threaded","name":"http://www.securityfocus.com/archive/1/456973/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-0333","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0333","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"333","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"agnitum","cpe5":"outpost_firewall","cpe6":"4.0","cpe7":"*","cpe8":"pro","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T12:12:18.103Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20070115 Outpost Bypassing Self-Protection using file links Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/456973/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php"},{"name":"22069","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/22069"},{"name":"33480","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/33480"},{"name":"2163","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/2163"},{"name":"outpostfirewall-zwset-privilege-escalation(31529)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31529"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-01-15T00:00:00.000Z","descriptions":[{"lang":"en","value":"Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-16T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"20070115 Outpost Bypassing Self-Protection using file links Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/456973/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php"},{"name":"22069","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/22069"},{"name":"33480","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/33480"},{"name":"2163","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/2163"},{"name":"outpostfirewall-zwset-privilege-escalation(31529)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31529"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2007-0333","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20070115 Outpost Bypassing Self-Protection using file links Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/456973/100/0/threaded"},{"name":"http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php","refsource":"MISC","url":"http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php"},{"name":"22069","refsource":"BID","url":"http://www.securityfocus.com/bid/22069"},{"name":"33480","refsource":"OSVDB","url":"http://osvdb.org/33480"},{"name":"2163","refsource":"SREASON","url":"http://securityreason.com/securityalert/2163"},{"name":"outpostfirewall-zwset-privilege-escalation(31529)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31529"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2007-0333","datePublished":"2007-01-18T02:00:00.000Z","dateReserved":"2007-01-17T00:00:00.000Z","dateUpdated":"2024-08-07T12:12:18.103Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2007-01-18 02:28:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:agnitum:outpost_firewall:4.0:*:pro:*:*:*:*:*","matchCriteriaId":"672B053D-A9A6-441F-B04A-E654C1445A16"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"333","Ordinal":"1","Title":"CVE-2007-0333","CVE":"CVE-2007-0333","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"333","Ordinal":"1","NoteData":"Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys.","Type":"Description","Title":"CVE-2007-0333"},{"CveYear":"2007","CveId":"333","Ordinal":"2","NoteData":"2007-01-17","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"333","Ordinal":"3","NoteData":"2018-10-16","Type":"Other","Title":"Modified"}]}}}