Product:

Zonealarm

(Zonelabs)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 20
Date Id Summary Products Score Patch Annotated
2004-12-31 CVE-2004-2713 Zone Alarm Pro 1.0 through 5.1 gives full access to %windir%\Internet Logs\* to the EVERYONE group, which allows local users to cause a denial of service by modifying the folder contents or permissions. NOTE: this issue has been disputed by the vendor, who claims that it does not affect product functionality since the same information is also saved in a protected file Zonealarm N/A
2001-08-29 CVE-2001-0682 ZoneAlarm and ZoneAlarm Pro allows a local attacker to cause a denial of service by running a trojan to initialize a ZoneAlarm mutex object which prevents ZoneAlarm from starting. Zonealarm_pro, Zonealarm 5.5
2000-04-24 CVE-2000-0339 ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules. Zonealarm N/A
2000-02-24 CVE-2000-0220 ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event. Zonealarm N/A
2005-05-24 CVE-2005-1693 Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 through 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB) r11.1, Vet Antivirus, Zonelabs ZoneAlarm Security Suite, and ZoneAlarm Antivirus, allows remote attackers to gain privileges via a compressed VBA directory with a project name length of -1, which leads to a heap-based buffer overflow. Etrust_antivirus, Etrust_antivirus_ee, Etrust_ez_armor, Etrust_ez_armor_le, Etrust_intrusion_detection, Etrust_secure_content_manager, Inoculateit, Brightstor_arcserve_backup, Etrust_antivirus, Etrust_intrusion_detection, Etrust_secure_content_manager, Vet_antivirus, Zonealarm, Zonealarm_antivirus N/A
2007-09-23 CVE-2007-5044 ZoneAlarm Pro 7.0.362.000 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via the (1) NtCreatePort and (2) NtDeleteFile kernel SSDT hooks, a partial regression of CVE-2007-2083. Zonealarm N/A
2007-05-02 CVE-2007-2467 ZoneAlarm Pro 6.5.737.000, 6.1.744.001, and possibly earlier versions and other products, allows local users to cause a denial of service (system crash) by sending malformed data to the vsdatant device driver, which causes an invalid memory access. Zonealarm N/A
2007-04-18 CVE-2007-2083 vsdatant.sys in Check Point Zone Labs ZoneAlarm Pro before 7.0.302.000 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (system crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateKey and (2) NtDeleteFile functions. Zonealarm N/A
2007-01-19 CVE-2007-0351 Microsoft Windows XP and Windows Server 2003 do not properly handle user logoff, which might allow local users to gain the privileges of a previous system user, possibly related to user profile unload failure. NOTE: it is not clear whether this is an issue in Windows itself, or an interaction with another product. The issue might involve ZoneAlarm not being able to terminate processes when it cannot prompt the user. Zonealarm N/A
2005-11-16 CVE-2005-3560 Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags. Zonealarm, Zonealarm_anti\-Spyware, Zonealarm_antivirus, Zonealarm_security_suite N/A