var-200502-0086
Vulnerability from variot

vsdatant.sys in Zone Lab ZoneAlarm before 5.5.062.011, ZoneAlarm Wireless before 5.5.080.000, Check Point Integrity Client 4.x before 4.5.122.000 and 5.x before 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid memory address, which allows local users to cause a denial of service (system crash) when ZoneAlarm attempts to dereference an invalid pointer. Multiple ZoneAlarm products and Check Point Integrity Client are reported prone to a local denial of service vulnerability. This issue exists due to an invalid pointer dereference. A successful attack can result in a denial of service condition in the kernel. ZoneAlarm Security Suite, ZoneAlarm Pro, and ZoneAlarm versions prior to 5.5.062.011 and Check Point Integrity Client versions prior to 4.5.122.000 and 5.1.556.166 are considered vulnerable to this issue. ZoneAlarm is a popular desktop firewall system. BACKGROUND

Zone Labs ZoneAlarm provides personal firewall protection. More information is available from:

http://www.zonelabs.com/

II.

ZoneAlarm offers process specific protection by hooking the kernel API routine NtConnectPort(). NtConnectPort() is used by programs to implement advanced inter-process communication (IPC). The NtConnectPort() function is declared as follows:

NtConnectPort(
    OUT PHANDLE ClientPortHandle,
    IN PUNICODE_STRING ServerPortName,
    IN PSECURITY_QUALITY_OF_SERVICE SecurityQos,
    IN OUT PLPC_SECTION_OWNER_MEMORY ClientSharedMemory OPTIONAL,
    OUT PLPC_SECTION_MEMORY ServerSharedMemory OPTIONAL,
    OUT PULONG MaximumMessageLength OPTIONAL,
    IN OUT PVOID ConnectionInfo OPTIONAL,
    IN OUT PULONG ConnectionInfoLength OPTIONAL);

The problem specifically exists within vsdatant.sys as ZoneAlarm fails to verify the second argument. 'ServerPortName' is a valid address prior to derefencing it as a pointer. The vulnerable section of code is displayed here:

0001EE93 mov esi, [esp+108h+ServerPortName]
0001EE9A mov edi, eax
0001EE9C test esi, esi
0001EE9E jz short loc_1EEB6
0001EEA0 mov edx, [esi+4]

The argument 'ServerPortName' is stored in the register ESI. A check is made to ensure that the value is not NULL. Any non-zero invalid memory address can be passed as the second argument to NtConnectPort(), resulting in a system crash.

III. ANALYSIS

Exploitation allows local and remote attackers who have exploited another vulnerability to trigger a DoS in kernel space, resulting in a "blue screen of death."

IV. DETECTION

iDEFENSE has confirmed the existence of this vulnerability in ZoneAlarm version 5.1. It is suspected that previous versions of ZoneAlarm are vulnerable as well.

V. WORKAROUND

iDEFENSE is currently unaware of any workarounds for this issue.

VI. VENDOR RESPONSE

A vendor advisory for this issue is available at:

http://download.zonelabs.com/bin/free/securityAlert/19.html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the names CAN-2005-0114 to these issues. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.

VIII. DISCLOSURE TIMELINE

01/06/2005 Initial vendor notification 01/07/2005 Initial vendor response 02/11/2005 Coordinated public disclosure

IX. CREDIT

iDEFENSE Labs is credited with this discovery.

Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright (c) 2005 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDEFENSE. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition.

There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200502-0086",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "zonealarm wireless security",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "zonelabs",
        "version": "5.5.080.000"
      },
      {
        "model": "zonealarm",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zonelabs",
        "version": "5.5.062.011"
      },
      {
        "model": "check point integrity client",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "checkpoint",
        "version": "5.1.556.166"
      },
      {
        "model": "check point integrity client",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "checkpoint",
        "version": "4.5.122.000"
      },
      {
        "model": "zonealarm wireless security",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "zonelabs",
        "version": "5.5.080.000"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.1"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.1"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.0.590.015"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.5.538.001"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.5"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.0"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.1"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.0"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.6"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.4"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.1"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.5.538.001"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.0"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.7.202"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.1"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.0"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.6"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.5"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.4"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.3"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.2"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.1"
      },
      {
        "model": "point software integrity client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "check",
        "version": "5.0"
      },
      {
        "model": "point software integrity client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "check",
        "version": "4.5"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062.011"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062.011"
      },
      {
        "model": "labs zonealarm",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062.011"
      },
      {
        "model": "point software integrity client",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "check",
        "version": "5.1.556.166"
      },
      {
        "model": "point software integrity client",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "check",
        "version": "4.4.122.000"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "12531"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0114"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:zonelabs:zonealarm:5.5.062.011:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:check_point_integrity_client:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.1.556.166",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zonelabs:zonealarm_wireless_security:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.5.080.000",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:check_point_integrity_client:4.5.122.000:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0114"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovery is credited to iDEFENSE Labs.",
    "sources": [
      {
        "db": "BID",
        "id": "12531"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2005-0114",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "VHN-11323",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2005-0114",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "LOW",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2005-0114",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200502-047",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-11323",
            "trust": 0.1,
            "value": "LOW"
          },
          {
            "author": "VULMON",
            "id": "CVE-2005-0114",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11323"
      },
      {
        "db": "VULMON",
        "id": "CVE-2005-0114"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0114"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "vsdatant.sys in Zone Lab ZoneAlarm before 5.5.062.011, ZoneAlarm Wireless before 5.5.080.000, Check Point Integrity Client 4.x before 4.5.122.000 and 5.x before 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid memory address, which allows local users to cause a denial of service (system crash) when ZoneAlarm attempts to dereference an invalid pointer. Multiple ZoneAlarm products and Check Point Integrity Client are reported prone to a local denial of service vulnerability.  This issue exists due to an invalid pointer dereference. \nA successful attack can result in a denial of service condition in the kernel. \nZoneAlarm Security Suite, ZoneAlarm Pro, and ZoneAlarm versions prior to 5.5.062.011 and Check Point Integrity Client versions prior to 4.5.122.000 and 5.1.556.166 are considered vulnerable to this issue. ZoneAlarm is a popular desktop firewall system. BACKGROUND\n\nZone Labs ZoneAlarm provides personal firewall protection. More\ninformation is available from:\n\n    http://www.zonelabs.com/\n\nII. \n\nZoneAlarm offers process specific protection by hooking the kernel API\nroutine NtConnectPort(). NtConnectPort() is used by programs to\nimplement advanced inter-process communication (IPC). The\nNtConnectPort() function is declared as follows:\n\n    NtConnectPort(\n        OUT PHANDLE ClientPortHandle,\n        IN PUNICODE_STRING ServerPortName,\n        IN PSECURITY_QUALITY_OF_SERVICE SecurityQos,\n        IN OUT PLPC_SECTION_OWNER_MEMORY ClientSharedMemory OPTIONAL,\n        OUT PLPC_SECTION_MEMORY ServerSharedMemory OPTIONAL,\n        OUT PULONG MaximumMessageLength OPTIONAL,\n        IN OUT PVOID ConnectionInfo OPTIONAL,\n        IN OUT PULONG ConnectionInfoLength OPTIONAL);\n\nThe problem specifically exists within vsdatant.sys as ZoneAlarm fails\nto verify the second argument. \u0027ServerPortName\u0027 is a valid address\nprior to derefencing it as a pointer. The vulnerable section of code is\ndisplayed here:\n\n    0001EE93 mov esi, [esp+108h+ServerPortName]\n    0001EE9A mov edi, eax\n    0001EE9C test esi, esi\n    0001EE9E jz short loc_1EEB6\n    0001EEA0 mov edx, [esi+4]\n\nThe argument \u0027ServerPortName\u0027 is stored in the register ESI. A check is\nmade to ensure that the value is not NULL. Any non-zero invalid memory address\ncan be passed as the second argument to NtConnectPort(), resulting in a\nsystem crash. \n\nIII. ANALYSIS\n\nExploitation allows local and remote attackers who have exploited\nanother vulnerability to trigger a DoS in kernel space, resulting in a\n\"blue screen of death.\"\n\nIV. DETECTION\n\niDEFENSE has confirmed the existence of this vulnerability in ZoneAlarm\nversion 5.1. It is suspected that previous versions of ZoneAlarm are\nvulnerable as well. \n\nV. WORKAROUND\n\niDEFENSE is currently unaware of any workarounds for this issue. \n\nVI. VENDOR RESPONSE\n\nA vendor advisory for this issue is available at:\n\n   http://download.zonelabs.com/bin/free/securityAlert/19.html\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nnames CAN-2005-0114 to these issues. This is a candidate for inclusion\nin the CVE list (http://cve.mitre.org), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n01/06/2005      Initial vendor notification\n01/07/2005      Initial vendor response\n02/11/2005      Coordinated public disclosure\n\nIX. CREDIT\n\niDEFENSE Labs is credited with this discovery. \n\nGet paid for vulnerability research\nhttp://www.idefense.com/poi/teams/vcp.jsp\n\nX. LEGAL NOTICES\n\nCopyright (c) 2005 iDEFENSE, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDEFENSE. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically, please\nemail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \n\nThere are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct, indirect,\nor consequential loss or damage arising from use of, or reliance on,\nthis information",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0114"
      },
      {
        "db": "BID",
        "id": "12531"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11323"
      },
      {
        "db": "VULMON",
        "id": "CVE-2005-0114"
      },
      {
        "db": "PACKETSTORM",
        "id": "36163"
      }
    ],
    "trust": 1.44
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-11323",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11323"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2005-0114",
        "trust": 2.2
      },
      {
        "db": "BID",
        "id": "12531",
        "trust": 2.1
      },
      {
        "db": "SECUNIA",
        "id": "14256",
        "trust": 1.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200502-047",
        "trust": 0.7
      },
      {
        "db": "IDEFENSE",
        "id": "20050211 ZONEALARM 5.1 INVALID POINTER DEREFERENCE VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "36163",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-11323",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2005-0114",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11323"
      },
      {
        "db": "VULMON",
        "id": "CVE-2005-0114"
      },
      {
        "db": "BID",
        "id": "12531"
      },
      {
        "db": "PACKETSTORM",
        "id": "36163"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0114"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ]
  },
  "id": "VAR-200502-0086",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11323"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:45:27.123000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0114"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/12531"
      },
      {
        "trust": 1.9,
        "url": "http://download.zonelabs.com/bin/free/securityalert/19.html"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/14256"
      },
      {
        "trust": 1.8,
        "url": "http://www.idefense.com/application/poi/display?id=199\u0026type=vulnerabilities"
      },
      {
        "trust": 0.3,
        "url": "http://www.zonelabs.com"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/390199"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/390198"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/application/poi/display?id=199\u0026amp;type=vulnerabilities"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/poi/teams/vcp.jsp"
      },
      {
        "trust": 0.1,
        "url": "http://www.zonelabs.com/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org),"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0114"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11323"
      },
      {
        "db": "VULMON",
        "id": "CVE-2005-0114"
      },
      {
        "db": "BID",
        "id": "12531"
      },
      {
        "db": "PACKETSTORM",
        "id": "36163"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0114"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-11323"
      },
      {
        "db": "VULMON",
        "id": "CVE-2005-0114"
      },
      {
        "db": "BID",
        "id": "12531"
      },
      {
        "db": "PACKETSTORM",
        "id": "36163"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0114"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-02-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-11323"
      },
      {
        "date": "2005-02-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2005-0114"
      },
      {
        "date": "2005-02-11T00:00:00",
        "db": "BID",
        "id": "12531"
      },
      {
        "date": "2005-02-24T16:48:40",
        "db": "PACKETSTORM",
        "id": "36163"
      },
      {
        "date": "2005-02-11T05:00:00",
        "db": "NVD",
        "id": "CVE-2005-0114"
      },
      {
        "date": "2005-02-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-09-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-11323"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2005-0114"
      },
      {
        "date": "2009-07-12T10:06:00",
        "db": "BID",
        "id": "12531"
      },
      {
        "date": "2008-09-05T20:45:21.747000",
        "db": "NVD",
        "id": "CVE-2005-0114"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "12531"
      },
      {
        "db": "PACKETSTORM",
        "id": "36163"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ],
    "trust": 1.0
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ZoneAlarm 5.1 Illegal pointer discards local denial of service vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "12531"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200502-047"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.