AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2006-12-18T11:00:00
Updated: 2024-08-07T20:33:59.809Z
Reserved: 2006-12-17T00:00:00
Link: CVE-2006-6618
Vulnrichment
No data.
NVD
Status : Modified
Published: 2006-12-18T11:28:00.000
Modified: 2024-11-21T00:23:12.417
Link: CVE-2006-6618
Redhat
No data.