Race condition in Outpost Security Suite Pro 6.7.3.3063.452.0726 and 7.0.3330.505.1221 BETA on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
2012-08-25T21:55:03.353
2025-04-11T00:51:21.963
Deferred
CVSSv2: 6.2 (MEDIUM)
AV:L/AC:H/Au:N/C:C/I:C/A:C
1.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | agnitum | outpost_security_suite | 6.7.3.3063.452.0726 | Yes |
Application | agnitum | outpost_security_suite | 7.0.3330.505.1221 | Yes |
Operating System | microsoft | windows_xp | * | No |