header-logo
Suggest Exploit
vendor:
Firewall
by:
SecurityFocus
7.5
CVSS
HIGH
Bypass Component Controls
20
CWE
Product Name: Firewall
Affected Version From: 2.4.17.183
Affected Version To: 2.3.6.81
Patch Exists: YES
Related CWE: N/A
CPE: a:comodo:comodo_firewall
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2006

Comodo Firewall Design Error

Comodo Firewall is prone to a design error in its cryptographic hashing function for component controls. Exploiting this flaw permits attackers to bypass the application's component controls. The application keeps a list of process-module checksums for allowed components. Due to the improper use of a cyclic redundancy check, rather than a cryptographic hash function in developing module checksums, an attacker can trivially insert a malicious control with the same CRC as a trusted component.

Mitigation:

Upgrade to the latest version of Comodo Firewall to mitigate this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22570/info

Comodo Firewall is prone to a design error in its cryptographic hashing function for component controls.

Exploiting this flaw permits attackers to bypass the application's component controls. The application keeps a list of process-module checksums for allowed components. Due to the improper use of a cyclic redundancy check, rather than a cryptographic hash function in developing module checksums, an attacker can trivially insert a malicious control with the same CRC as a trusted component.

Comodo Firewall Pro 2.4.17.183 and 2.4.16.174 and Comodo Personal Firewall 2.3.6.81 are vulnerable; other versions may also be affected. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29603.zip