Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Firewall)  >   BlackICE Vendors:   Internet Security Systems
BlackICE Insufficient Access Controls on 'pamversion.dll' Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1016618
SecurityTracker URL:
CVE Reference:   CVE-2006-3999   (Links to External Site)
Updated:  Jun 8 2008
Original Entry Date:  Aug 1 2006
Impact:   Modification of system information, User access via local system
Exploit Included:  Yes  
Version(s): 3.6 cpiE, 3.6 cpj
Description:   David Matousek of reported a vulnerability in BlackICE. The software does not properly protect a DLL component, which may allow a local user to gain elevated privileges.

The application does not properly protect the 'pamversion.dll' component in the installation directory. The component is loaded by the BlackICE service ('blackd.exe') during initialization. A local user can modify the DLL to cause arbitrary code to be executed by the BlackICE service.

The vendor was notified on August 1, 2006.

The original advisory is available at:

Impact:   A local user can modify a DLL to cause arbitrary code to be executed by the BlackICE service.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  ISS BlackICE PC Protection DLL faking of run-time linked libraries

BlackICE does not protect pamversion.dll in its installation directory. And also because its component
protection fails to protect BlackICE processes this can be misused to inject fake DLL into BlackICE service.

The whole advisory with more details and source code is available here


David Matousek

Founder and Chief Representative of Matousec - Transparent security

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC