Description
Agnitum Outpost Firewall PRO 4.0 allows local users to bypass access restrictions and insert Trojan horse drivers into the product's installation directory by creating links using FileLinkInformation requests with the ZwSetInformationFile function, as demonstrated by modifying SandBox.sys.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Matousec Transparent security · textlocalwindows
https://www.exploit-db.com/exploits/29465
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/456973/100/0/threaded
Vendor Advisory x_refsource_misc
http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22069
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/33480
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2163
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/31529
Scores
EPSS
0.0014
EPSS Percentile
33.4%
Details
Status
published
Products (1)
agnitum/outpost_firewall
4.0
Published
Jan 18, 2007
Tracked Since
Feb 18, 2026