CVE-2009-2450

Tallemu Online Armor Personal Firewall Av+ < 3.5.0.11 - Memory Corruption

Title source: rule
STIX 2.1

Description

The OAmon.sys kernel driver 3.1.0.0 and earlier in Tall Emu Online Armor Personal Firewall AV+ before 3.5.0.12, and Personal Firewall 3.5 before 3.5.0.14, allows local users to gain privileges via crafted METHOD_NEITHER IOCTL requests to \Device\OAmon containing arbitrary kernel addresses, as demonstrated using the 0x830020C3 IOCTL.

Exploits (1)

exploitdb WORKING POC VERIFIED
by NT Internals · textlocalwindows
https://www.exploit-db.com/exploits/8875

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/50960
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/35227
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/8875

Scores

EPSS 0.0032
EPSS Percentile 54.6%

Details

CWE
CWE-119
Status published
Products (16)
tallemu/online_armor_personal_firewall_av\+ 3.5.0.6
tallemu/online_armor_personal_firewall_av\+ 3.5.0.9
tallemu/online_armor_personal_firewall_av\+ < 3.5.0.11
tallemu/personal_firewall 3.5.0.1
tallemu/personal_firewall 3.5.0.2
tallemu/personal_firewall 3.5.0.3
tallemu/personal_firewall 3.5.0.4
tallemu/personal_firewall 3.5.0.5
tallemu/personal_firewall 3.5.0.6
tallemu/personal_firewall 3.5.0.7
... and 6 more
Published Jul 13, 2009
Tracked Since Feb 18, 2026