AOH :: HP Unsorted C :: C07-2499.HTM

Comodo Bypassing settings protection using magic pipe Vulnerability



Comodo Bypassing settings protection using magic pipe Vulnerability
Comodo Bypassing settings protection using magic pipe Vulnerability



Hello,

We would like to inform you about a vulnerability in Comodo Firewall Pro.


Description:

Comodo Firewall Pro (former Comodo Personal Firewall) stores some of its internal settings in the registry key 
HKLM\SYSTEM\Software\Comodo\Personal Firewall. This key is protected by Comodo drivers such that other applications are 
not able to change the settings. This protection can be bypassed if very special conditions are met. CFP internally uses 
a named pipe, which name varies, but can be always determined. A process that opens this pipe many times is able to 
manipulate the protected settings of CFP. A proper modification of the settings will disable all protection mechanisms 
implemented by CFP after a reboot.


Vulnerable software:

     * Comodo Firewall Pro 2.4.18.184
     * Comodo Firewall Pro 2.4.17.183
     * Comodo Firewall Pro 2.4.16.174
     * Comodo Personal Firewall 2.3.6.81
     * probably all older versions of Comodo Personal Firewall 2
     * possibly older versions of Comodo Personal Firewall




More details and a proof of concept including its source code are available here:
http://www.matousec.com/info/advisories/Comodo-Bypassing-settings-protection-using-magic-pipe.php 


Regards,

-- 
Matousec - Transparent security Research
http://www.matousec.com/ 

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.