CVE-2006-4541
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
05/09/2006
Last modified:
03/04/2025
Description
RapDrv.sys in BlackICE PC Protection 3.6.cpn, cpj, cpiE, and possibly 3.6 and earlier, allows local users to cause a denial of service (crash) via a NULL third argument to the NtOpenSection API function. NOTE: it was later reported that 3.6.cqn is also affected.
Impact
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:iss:blackice_pc_protection:*:*:*:*:*:*:*:* | 3.6 (including) | |
| cpe:2.3:a:iss:blackice_pc_protection:3.6cpie:*:*:*:*:*:*:* | ||
| cpe:2.3:a:iss:blackice_pc_protection:3.6cpj:*:*:*:*:*:*:* | ||
| cpe:2.3:a:iss:blackice_pc_protection:3.6cpn:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/21710
- http://securityreason.com/securityalert/1512
- http://www.matousec.com/info/advisories/BlackICE-Insufficient-validation-of-arguments-of-NtOpenSection.php
- http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php
- http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php
- http://www.osvdb.org/28332
- http://www.securityfocus.com/archive/1/444958/100/0/threaded
- http://www.securityfocus.com/archive/1/479830/100/0/threaded
- http://www.securityfocus.com/bid/19800
- http://www.vupen.com/english/advisories/2006/3431
- http://secunia.com/advisories/21710
- http://securityreason.com/securityalert/1512
- http://www.matousec.com/info/advisories/BlackICE-Insufficient-validation-of-arguments-of-NtOpenSection.php
- http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php
- http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php
- http://www.osvdb.org/28332
- http://www.securityfocus.com/archive/1/444958/100/0/threaded
- http://www.securityfocus.com/archive/1/479830/100/0/threaded
- http://www.securityfocus.com/bid/19800
- http://www.vupen.com/english/advisories/2006/3431



