All the vulnerabilites related to Check Point - ZoneAlarm Extreme Security
var-202007-1414
Vulnerability from variot
ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems. ZoneAlarm Firewall and Antivirus The product contains a vulnerability in permission management.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows local attackers to escalate privileges on affected installations of Check Point ZoneAlarm. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the ZoneAlarm Service. The issue results from the lack of proper validation of a user-supplied symbolic link prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-1414", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "zonealarm extreme security", "scope": "lt", "trust": 1.0, "vendor": "checkpoint", "version": "15.8.109.18436" }, { "model": "zonealarm extreme security", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "15.8.109.18436" }, { "model": "zonealarm", "scope": null, "trust": 0.7, "vendor": "check point", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-803" }, { "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "db": "NVD", "id": "CVE-2020-6013" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:checkpoint:zonealarm_extreme_security:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.8.109.18436", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-6013" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Glenn Lloyd", "sources": [ { "db": "ZDI", "id": "ZDI-20-803" } ], "trust": 0.7 }, "cve": "CVE-2020-6013", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-007626", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-184138", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-007626", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2020-6013", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-6013", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-007626", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-6013", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202007-179", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-184138", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-803" }, { "db": "VULHUB", "id": "VHN-184138" }, { "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "db": "NVD", "id": "CVE-2020-6013" }, { "db": "CNNVD", "id": "CNNVD-202007-179" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems. ZoneAlarm Firewall and Antivirus The product contains a vulnerability in permission management.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows local attackers to escalate privileges on affected installations of Check Point ZoneAlarm. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the ZoneAlarm Service. The issue results from the lack of proper validation of a user-supplied symbolic link prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM", "sources": [ { "db": "NVD", "id": "CVE-2020-6013" }, { "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "db": "ZDI", "id": "ZDI-20-803" }, { "db": "VULHUB", "id": "VHN-184138" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6013", "trust": 3.2 }, { "db": "ZDI", "id": "ZDI-20-803", "trust": 1.3 }, { "db": "JVNDB", "id": "JVNDB-2020-007626", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10071", "trust": 0.7 }, { "db": "NSFOCUS", "id": "47066", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202007-179", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-184138", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-803" }, { "db": "VULHUB", "id": "VHN-184138" }, { "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "db": "NVD", "id": "CVE-2020-6013" }, { "db": "CNNVD", "id": "CNNVD-202007-179" } ] }, "id": "VAR-202007-1414", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-184138" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:18:10.716000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Release History", "trust": 0.8, "url": "https://www.zonealarm.com/software/extreme-security/release-history" }, { "title": "Check Point has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk142952" }, { "title": "Check Point ZoneAlarm Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=122943" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-803" }, { "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "db": "CNNVD", "id": "CNNVD-202007-179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-184138" }, { "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "db": "NVD", "id": "CVE-2020-6013" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.zonealarm.com/software/extreme-security/release-history" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6013" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6013" }, { "trust": 0.7, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk142952" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/check-point-zonealarm-extreme-security-privilege-escalation-via-service-symbolic-link-32702" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47066" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-803/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-803" }, { "db": "VULHUB", "id": "VHN-184138" }, { "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "db": "NVD", "id": "CVE-2020-6013" }, { "db": "CNNVD", "id": "CNNVD-202007-179" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-803" }, { "db": "VULHUB", "id": "VHN-184138" }, { "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "db": "NVD", "id": "CVE-2020-6013" }, { "db": "CNNVD", "id": "CNNVD-202007-179" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-02T00:00:00", "db": "ZDI", "id": "ZDI-20-803" }, { "date": "2020-07-06T00:00:00", "db": "VULHUB", "id": "VHN-184138" }, { "date": "2020-08-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "date": "2020-07-06T18:15:21.230000", "db": "NVD", "id": "CVE-2020-6013" }, { "date": "2020-07-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-179" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-02T00:00:00", "db": "ZDI", "id": "ZDI-20-803" }, { "date": "2020-07-13T00:00:00", "db": "VULHUB", "id": "VHN-184138" }, { "date": "2020-08-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007626" }, { "date": "2020-07-13T14:34:34.163000", "db": "NVD", "id": "CVE-2020-6013" }, { "date": "2020-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-179" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZoneAlarm Firewall and Antivirus Product permission management vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007626" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-179" } ], "trust": 0.6 } }
var-201208-0060
Vulnerability from variot
Race condition in ZoneAlarm Extreme Security 9.1.507.000 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute. ** Unsettled ** This case has not been confirmed as a vulnerability. This vulnerability is also known as argument-switch Attack, or KHOBE It is called an attack
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201208-0060", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "zonealarm extreme security", "scope": "eq", "trust": 1.0, "vendor": "checkpoint", "version": "9.1.507.000" }, { "model": "zonealarm extreme security", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "9.1.507.000" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005720" }, { "db": "NVD", "id": "CVE-2010-5184" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:checkpoint:zonealarm_extreme_security:9.1.507.000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-5184" } ] }, "cve": "CVE-2010-5184", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 1.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2010-5184", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 1.9, "id": "VHN-47789", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:H/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-5184", "trust": 1.8, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-47789", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-47789" }, { "db": "JVNDB", "id": "JVNDB-2010-005720" }, { "db": "NVD", "id": "CVE-2010-5184" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Race condition in ZoneAlarm Extreme Security 9.1.507.000 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute. ** Unsettled ** This case has not been confirmed as a vulnerability. This vulnerability is also known as argument-switch Attack, or KHOBE It is called an attack", "sources": [ { "db": "NVD", "id": "CVE-2010-5184" }, { "db": "JVNDB", "id": "JVNDB-2010-005720" }, { "db": "VULHUB", "id": "VHN-47789" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "39924", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2010-5184", "trust": 2.5 }, { "db": "OSVDB", "id": "67660", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2010-005720", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201208-727", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-47789", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-47789" }, { "db": "JVNDB", "id": "JVNDB-2010-005720" }, { "db": "CNNVD", "id": "CNNVD-201208-727" }, { "db": "NVD", "id": "CVE-2010-5184" } ] }, "id": "VAR-201208-0060", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-47789" } ], "trust": 0.01 }, "last_update_date": "2024-05-17T22:42:13.287000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.zonealarm.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005720" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-47789" }, { "db": "JVNDB", "id": "JVNDB-2010-005720" }, { "db": "NVD", "id": "CVE-2010-5184" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/39924" }, { "trust": 2.5, "url": "http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html" }, { "trust": 1.7, "url": "http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/" }, { "trust": 1.7, "url": "http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php" }, { "trust": 1.7, "url": "http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php" }, { "trust": 1.7, "url": "http://www.f-secure.com/weblog/archives/00001949.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-5184" }, { "trust": 1.1, "url": "http://www.osvdb.org/67660" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-5184" } ], "sources": [ { "db": "VULHUB", "id": "VHN-47789" }, { "db": "JVNDB", "id": "JVNDB-2010-005720" }, { "db": "CNNVD", "id": "CNNVD-201208-727" }, { "db": "NVD", "id": "CVE-2010-5184" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-47789" }, { "db": "JVNDB", "id": "JVNDB-2010-005720" }, { "db": "CNNVD", "id": "CNNVD-201208-727" }, { "db": "NVD", "id": "CVE-2010-5184" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-08-25T00:00:00", "db": "VULHUB", "id": "VHN-47789" }, { "date": "2019-07-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005720" }, { "date": "2012-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-727" }, { "date": "2012-08-25T21:55:04.023000", "db": "NVD", "id": "CVE-2010-5184" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-09-05T00:00:00", "db": "VULHUB", "id": "VHN-47789" }, { "date": "2019-07-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005720" }, { "date": "2021-11-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201208-727" }, { "date": "2024-05-17T00:48:29.650000", "db": "NVD", "id": "CVE-2010-5184" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Windows XP Run on ZoneAlarm Extreme Security Kernel mode hook handler bypass vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-005720" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201208-727" } ], "trust": 0.6 } }
cve-2024-6233
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-1036/ | x_research-advisory |
▼ | Vendor | Product |
---|---|---|
Check Point | ZoneAlarm Extreme Security |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:check_point:zonealarm_extreme_security:4.0.148.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "zonealarm_extreme_security", "vendor": "check_point", "versions": [ { "status": "affected", "version": "4.0.148.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6233", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-22T20:43:03.859640Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:55:29.976Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "ZoneAlarm Extreme Security", "vendor": "Check Point", "versions": [ { "status": "affected", "version": "4.0.148.0" } ] } ], "dateAssigned": "2024-06-20T16:51:41.939-05:00", "datePublic": "2024-07-31T16:19:51.078-05:00", "descriptions": [ { "lang": "en", "value": "Check Point ZoneAlarm Extreme Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Check Point ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Forensic Recorder service. By creating a symbolic link, an attacker can abuse the service to overwrite arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21677." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:05:39.766Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1036", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1036/" } ], "source": { "lang": "en", "value": "Filip Dragovic (@filip_dragovic)" }, "title": "Check Point ZoneAlarm Extreme Security Link Following Local Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-6233", "datePublished": "2024-11-22T20:05:39.766Z", "dateReserved": "2024-06-20T21:51:41.913Z", "dateUpdated": "2024-11-22T20:55:29.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }