Vulnerability Details CVE-2009-2450
The OAmon.sys kernel driver 3.1.0.0 and earlier in Tall Emu Online Armor Personal Firewall AV+ before 3.5.0.12, and Personal Firewall 3.5 before 3.5.0.14, allows local users to gain privileges via crafted METHOD_NEITHER IOCTL requests to \Device\OAmon containing arbitrary kernel addresses, as demonstrated using the 0x830020C3 IOCTL.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 29.8%
CVSS Severity
CVSS v2 Score 7.2
Products affected by CVE-2009-2450
-
cpe:2.3:a:tallemu:online_armor_personal_firewall_av+:*
-
cpe:2.3:a:tallemu:online_armor_personal_firewall_av+:3.5.0.6
-
cpe:2.3:a:tallemu:online_armor_personal_firewall_av+:3.5.0.9
-
cpe:2.3:a:tallemu:personal_firewall:*
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.1
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.10
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.11
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.12
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.2
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.3
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.4
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.5
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.6
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.7
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.8
-
cpe:2.3:a:tallemu:personal_firewall:3.5.0.9