23 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

24 Sep 2007 — ZoneAlarm Pro 7.0.362.000 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via the (1) NtCreatePort and (2) NtDeleteFile kernel SSDT hooks, a partial regression of CVE-2007-2083. ZoneAlarm Pro 7.0.362.000 no valida de forma adecuada ciertos parámetros en los maneadores de función System Service Descriptor Table (SSDT), lo cual permite a usuarios locales provoca... • http://osvdb.org/45898 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

02 May 2007 — ZoneAlarm Pro 6.5.737.000, 6.1.744.001, and possibly earlier versions and other products, allows local users to cause a denial of service (system crash) by sending malformed data to the vsdatant device driver, which causes an invalid memory access. ZoneAlarm Pro 6.5.737.000, 6.1.744.001, y posiblemente versiones anteriores y otros productos, permite a usuarios locales provocar una denegación de servicio (caída del sistema) enviando información mal formada al controlador de dispositivo vsdatant, lo cual prov... • http://osvdb.org/35240 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

18 Apr 2007 — vsdatant.sys in Check Point Zone Labs ZoneAlarm Pro before 7.0.302.000 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (system crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateKey and (2) NtDeleteFile functions. vsdatant.sys en Check Point Zone Labs ZoneAlarm Pro anterior a 7.0.302.000 no valida ciertos argumentos antes de ser pasados a manejadores de funciones SSDT, lo cual perm... • https://www.exploit-db.com/exploits/29860 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

19 Jan 2007 — Microsoft Windows XP and Windows Server 2003 do not properly handle user logoff, which might allow local users to gain the privileges of a previous system user, possibly related to user profile unload failure. NOTE: it is not clear whether this is an issue in Windows itself, or an interaction with another product. The issue might involve ZoneAlarm not being able to terminate processes when it cannot prompt the user. Microsoft Windows XP y Windows Server 2003 no manejan apropiadamente el cierre de sesión del... • http://www.securityfocus.com/archive/1/457167/100/0/threaded •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

13 Jul 2006 — Check Point Zone Labs ZoneAlarm Internet Security Suite 6.5.722.000, 6.1.737.000, and possibly other versions do not properly validate RegSaveKey, RegRestoreKey, and RegDeleteKey function calls, which allows local users to cause a denial of service (system crash) via a certain combination of these function calls with an HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VETFDDNT\Enum argument. Check Point Zone Labs ZoneAlarm Internet Security Suite 6.5.722.000, 6.1.737.000, y posiblemente otras versiones ... • http://www.matousec.com/info/advisories/ZoneAlarm-Insufficient-protection-of-registry-key-VETFDDNT-Enum.php •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

14 Mar 2006 — Untrusted search path vulnerability in the TrueVector service (VSMON.exe) in Zone Labs ZoneAlarm 6.x and Integrity does not search ZoneAlarm's own folders before other folders that are specified in a user's PATH, which might allow local users to execute code as SYSTEM by placing malicious DLLs into a folder that has insecure permissions, but is searched before ZoneAlarm's folder. NOTE: since this issue is dependent on the existence of a vulnerability in a separate product (weak permissions of executables or... • http://reedarvin.thearvins.com/20060308-01.html •

CVSS: 8.2EPSS: 9%CPEs: 6EXPL: 2

16 Nov 2005 — Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags. • https://www.exploit-db.com/exploits/26479 •

CVSS: 10.0EPSS: 5%CPEs: 28EXPL: 0

24 May 2005 — Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 through 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB) r11.1, Vet Antivirus, Zonelabs ZoneAlarm Security Suite, and ZoneAlarm Antivirus, allows remote attackers to gain privileges via a compressed VBA directory with a project name length of -1, which leads to a heap-based buffer overflow. • http://crm.my-etrust.com/login.asp?username=guest&target=DOCUMENT&openparameter=1588 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

11 Feb 2005 — vsdatant.sys in Zone Lab ZoneAlarm before 5.5.062.011, ZoneAlarm Wireless before 5.5.080.000, Check Point Integrity Client 4.x before 4.5.122.000 and 5.x before 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid memory address, which allows local users to cause a denial of service (system crash) when ZoneAlarm attempts to dereference an invalid pointer. • http://download.zonelabs.com/bin/free/securityAlert/19.html •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2004 — Zone Labs IMsecure and IMsecure Pro before 1.5 allow remote attackers to bypass Active Link Filtering via an instant message containing a URL with hex encoded file extensions. • http://download.zonelabs.com/bin/free/securityAlert/16.html •