var-200512-0017
Vulnerability from variot

Multiple Check Point Zone Labs ZoneAlarm products before 7.0.362, including ZoneAlarm Security Suite 5.5.062.004 and 6.5.737, use insecure default permissions for critical files, which allows local users to gain privileges or bypass security controls. Multiple Check Point ZoneAlarm products are prone to local privilege-escalation vulnerabilities. An attacker can exploit these issues to gain elevated privileges and completely compromise an affected computer. These issues have been confirmed in: ZoneAlarm 6.5.737 ZoneAlarm Security Suite 5.5.062.004 and 6.5.737. Other versions are likely vulnerable as well. The following are vulnerable: - Versions prior to ZoneAlarm 7.0.362 - Zone Labs products that include 'vsdatant.sys' 6.5.737.0. ZoneAlarm is a personal computer firewall that protects personal data and privacy. The IOCTL handling code of the ZoneAlarm product vsdatant.sys device driver does not validate the userland-supplied addresses passed to IOCTL 0x8400000F and IOCTL 0x84000013.

BETA test the new Secunia Personal Software Inspector!

The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.

Download the free PSI BETA from the Secunia website: https://psi.secunia.com/

TITLE: ZoneAlarm Products Insecure Directory Permissions and IOCTL Handler Privilege Escalation

SECUNIA ADVISORY ID: SA26513

VERIFY ADVISORY: http://secunia.com/advisories/26513/

CRITICAL: Less critical

IMPACT: Privilege escalation

WHERE: Local system

SOFTWARE: ZoneAlarm 6.x http://secunia.com/product/5806/ ZoneAlarm 7.x http://secunia.com/product/13889/ ZoneAlarm 5.x http://secunia.com/product/4647/ ZoneAlarm Pro 5.x http://secunia.com/product/4280/ ZoneAlarm Pro 6.x http://secunia.com/product/6071/ ZoneAlarm Security Suite 5.x http://secunia.com/product/4272/ ZoneAlarm 2.x http://secunia.com/product/3056/ ZoneAlarm 3.x http://secunia.com/product/153/ ZoneAlarm 4.x http://secunia.com/product/150/ ZoneAlarm Anti-Spyware 6.x http://secunia.com/product/6073/ ZoneAlarm Antivirus 5.x http://secunia.com/product/4271/ ZoneAlarm Antivirus 6.x http://secunia.com/product/6074/ ZoneAlarm Internet Security Suite 6.x http://secunia.com/product/6072/ ZoneAlarm Plus 3.x http://secunia.com/product/3057/ ZoneAlarm Plus 4.x http://secunia.com/product/151/ ZoneAlarm Pro 2.x http://secunia.com/product/152/ ZoneAlarm Pro 3.x http://secunia.com/product/1960/ ZoneAlarm Pro 4.x http://secunia.com/product/1961/ ZoneAlarm Wireless Security 5.x http://secunia.com/product/4648/

DESCRIPTION: Some vulnerabilities and a security issue have been reported in ZoneAlarm products, which can be exploited by malicious, local users to gain escalated privileges.

1) Insufficient address space verification within the 0x8400000F and 0x84000013 IOCTL handlers of vsdatant.sys and insecure permissions on the "\.\vsdatant" device interface can be exploited to e.g. access the said IOCTL handlers and overwrite arbitrary memory and execute code with kernel privileges.

SOLUTION: Update to version 7.0.362. http://www.zonealarm.com/store/content/catalog/download_buy.jsp?dc=12bms&ctry=US&lang=en

PROVIDED AND/OR DISCOVERED BY: 1) Ruben Santamarta, reported via iDefense Labs. 2) Discovered by an anonymous person and reported via iDefense Labs.

ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585

Reversemode: http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=53

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

. BACKGROUND

Zone Alarm products provide security solutions such as anti-virus, firewall, spy-ware, and ad-ware protection.

http://www.zonelabs.com/

II.

The vulnerability specifically exists in the default file Access Control List (ACL) settings that are applied during installation. When an administrator installs any of the Zone Labs ZoneAlarm tools, the default ACL allows any user to modify the installed files. Some of the programs run as system services. This allows a user to simply replace an installed ZoneAlarm file with their own code that will later be executed with system-level privileges.

III. ANALYSIS

Exploitation allows local attackers to escalate privileges to the system level. It is also possible to use this vulnerability to simply disable protection by moving all of the executable files so that they cannot start on a reboot.

IV.

V. WORKAROUND

Apply proper Access Control List settings to the directory that ZoneAlarm Security Suite is installed in. The ACL rules should make sure that no regular users can modify files in the directory.

VI.

http://www.zonealarm.com/store/content/catalog/products/trial_zaFamily/trial_zaFamily.jsp

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2005-2932 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems.

VIII. DISCLOSURE TIMELINE

09/29/2005 Initial vendor notification 09/29/2005 Initial vendor response 10/19/2006 Second vendor notification 08/20/2007 Coordinated public disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events http://labs.idefense.com/

X. LEGAL NOTICES

Copyright \xa9 2007 iDefense, Inc.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0017",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "zonealarm security suite",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "5.5.062.004"
      },
      {
        "model": "zonealarm security suite",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "6.5.737"
      },
      {
        "model": "zonealarm",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "checkpoint",
        "version": "7.0.337.0"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "zone",
        "version": "6.5.737"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "zone",
        "version": "5.5.62"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "zone",
        "version": "6.5.737"
      },
      {
        "model": "zonealarm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "checkpoint",
        "version": "7.0.337.0"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.5.722"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.1.744.000"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.1.737"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062.011"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5"
      },
      {
        "model": "labs zonealarm security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.1"
      },
      {
        "model": "labs zonealarm pro with web filtering",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.5.594"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.0"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062.011"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.1"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.0.590.015"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.5.538.001"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.5"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.0"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.1"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.0"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.6"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.4"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "7.0.302.000"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.5.737.000"
      },
      {
        "model": "labs zonealarm pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.1.744.001"
      },
      {
        "model": "labs zonealarm plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.5.538.001"
      },
      {
        "model": "labs zonealarm plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.0"
      },
      {
        "model": "labs zonealarm internet security suite",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.0"
      },
      {
        "model": "labs zonealarm for windows xp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.6"
      },
      {
        "model": "labs zonealarm for windows nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.02.6"
      },
      {
        "model": "labs zonealarm for windows nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.02.5"
      },
      {
        "model": "labs zonealarm for windows nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.02.4"
      },
      {
        "model": "labs zonealarm for windows nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.02.3"
      },
      {
        "model": "labs zonealarm for windows nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.02.2"
      },
      {
        "model": "labs zonealarm for windows nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.02.1"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "982.6"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "982.5"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "982.4"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "982.3"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "982.2"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "982.1"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "952.6"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "952.5"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "952.4"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "952.3"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "952.2"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "952.1"
      },
      {
        "model": "labs zonealarm for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "951.0"
      },
      {
        "model": "labs zonealarm antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.0"
      },
      {
        "model": "labs zonealarm antivirus",
        "scope": null,
        "trust": 0.3,
        "vendor": "zone",
        "version": null
      },
      {
        "model": "labs zonealarm anti-spyware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.1"
      },
      {
        "model": "labs zonealarm anti-spyware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.0"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "6.0"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.5.062.011"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "5.1"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.5.538.001"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "4.0"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.7.202"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.1"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "3.0"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.6"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.5"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.4"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.3"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.2"
      },
      {
        "model": "labs zonealarm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zone",
        "version": "2.1"
      },
      {
        "model": "labs zonealarm",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "zone",
        "version": "7.0.362"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "25377"
      },
      {
        "db": "BID",
        "id": "25365"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2932"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:zonealarm_security_suite:5.5.062.004:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:zonealarm_security_suite:6.5.737:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:checkpoint:zonealarm:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.0.337.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-2932"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ruben Santamarta  ruben@reversemode.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-2932",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-14141",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2005-2932",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200512-767",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-14141",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-14141"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2932"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple Check Point Zone Labs ZoneAlarm products before 7.0.362, including ZoneAlarm Security Suite 5.5.062.004 and 6.5.737, use insecure default permissions for critical files, which allows local users to gain privileges or bypass security controls. Multiple Check Point ZoneAlarm products are prone to local privilege-escalation vulnerabilities. \nAn attacker can exploit these issues to gain elevated privileges and completely compromise an affected computer. \nThese issues have been confirmed in:\nZoneAlarm 6.5.737\nZoneAlarm Security Suite 5.5.062.004 and 6.5.737. \nOther versions are likely vulnerable as well. \nThe following are vulnerable:\n- Versions prior to ZoneAlarm 7.0.362\n- Zone Labs products that include \u0027vsdatant.sys\u0027 6.5.737.0. ZoneAlarm is a personal computer firewall that protects personal data and privacy. The IOCTL handling code of the ZoneAlarm product vsdatant.sys device driver does not validate the userland-supplied addresses passed to IOCTL 0x8400000F and IOCTL 0x84000013. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nDownload the free PSI BETA from the Secunia website:\nhttps://psi.secunia.com/\n\n----------------------------------------------------------------------\n\nTITLE:\nZoneAlarm Products Insecure Directory Permissions and IOCTL Handler\nPrivilege Escalation\n\nSECUNIA ADVISORY ID:\nSA26513\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26513/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nPrivilege escalation\n\nWHERE:\nLocal system\n\nSOFTWARE:\nZoneAlarm 6.x\nhttp://secunia.com/product/5806/\nZoneAlarm 7.x\nhttp://secunia.com/product/13889/\nZoneAlarm 5.x\nhttp://secunia.com/product/4647/\nZoneAlarm Pro 5.x\nhttp://secunia.com/product/4280/\nZoneAlarm Pro 6.x\nhttp://secunia.com/product/6071/\nZoneAlarm Security Suite 5.x\nhttp://secunia.com/product/4272/\nZoneAlarm 2.x\nhttp://secunia.com/product/3056/\nZoneAlarm 3.x\nhttp://secunia.com/product/153/\nZoneAlarm 4.x\nhttp://secunia.com/product/150/\nZoneAlarm Anti-Spyware 6.x\nhttp://secunia.com/product/6073/\nZoneAlarm Antivirus 5.x\nhttp://secunia.com/product/4271/\nZoneAlarm Antivirus 6.x\nhttp://secunia.com/product/6074/\nZoneAlarm Internet Security Suite 6.x\nhttp://secunia.com/product/6072/\nZoneAlarm Plus 3.x\nhttp://secunia.com/product/3057/\nZoneAlarm Plus 4.x\nhttp://secunia.com/product/151/\nZoneAlarm Pro 2.x\nhttp://secunia.com/product/152/\nZoneAlarm Pro 3.x\nhttp://secunia.com/product/1960/\nZoneAlarm Pro 4.x\nhttp://secunia.com/product/1961/\nZoneAlarm Wireless Security 5.x\nhttp://secunia.com/product/4648/\n\nDESCRIPTION:\nSome vulnerabilities and a security issue have been reported in\nZoneAlarm products, which can be exploited by malicious, local users\nto gain escalated privileges. \n\n1) Insufficient address space verification within the 0x8400000F and\n0x84000013 IOCTL handlers of vsdatant.sys and insecure permissions on\nthe \"\\\\.\\vsdatant\" device interface can be exploited to e.g. access\nthe said IOCTL handlers and overwrite arbitrary memory and execute\ncode with kernel privileges. \n\nSOLUTION:\nUpdate to version 7.0.362. \nhttp://www.zonealarm.com/store/content/catalog/download_buy.jsp?dc=12bms\u0026ctry=US\u0026lang=en\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Ruben Santamarta, reported via iDefense Labs. \n2) Discovered by an anonymous person and reported via iDefense Labs. \n\nORIGINAL ADVISORY:\niDefense Labs:\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585\n\nReversemode:\nhttp://www.reversemode.com/index.php?option=com_remository\u0026Itemid=2\u0026func=fileinfo\u0026id=53\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. BACKGROUND\n\nZone Alarm products provide security solutions such as anti-virus,\nfirewall, spy-ware, and ad-ware protection. \n\nhttp://www.zonelabs.com/\n\nII. \n\nThe vulnerability specifically exists in the default file Access Control\nList (ACL) settings that are applied during installation. When an\nadministrator installs any of the Zone Labs ZoneAlarm tools, the\ndefault ACL allows any user to modify the installed files. Some of the\nprograms run as system services. This allows a user to simply replace\nan installed ZoneAlarm file with their own code that will later be\nexecuted with system-level privileges. \n\nIII. ANALYSIS\n\nExploitation allows local attackers to escalate privileges to the system\nlevel. It is also possible to use this vulnerability to simply disable\nprotection by moving all of the executable files so that they cannot\nstart on a reboot. \n\nIV. \n\nV. WORKAROUND\n\nApply proper Access Control List settings to the directory that\nZoneAlarm Security Suite is installed in. The ACL rules should make\nsure that no regular users can modify files in the directory. \n\nVI. \n\nhttp://www.zonealarm.com/store/content/catalog/products/trial_zaFamily/trial_zaFamily.jsp\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CVE-2005-2932 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org/), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n09/29/2005  Initial vendor notification\n09/29/2005  Initial vendor response\n10/19/2006  Second vendor notification\n08/20/2007  Coordinated public disclosure\n\nIX. CREDIT\n\nThe discoverer of this vulnerability wishes to remain anonymous. \n\nGet paid for vulnerability research\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\n\nFree tools, research and upcoming events\nhttp://labs.idefense.com/\n\nX. LEGAL NOTICES\n\nCopyright \\xa9 2007 iDefense, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDefense. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically,\nplease e-mail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \n There are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct,\nindirect, or consequential loss or damage arising from use of, or\nreliance on, this information",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-2932"
      },
      {
        "db": "BID",
        "id": "25377"
      },
      {
        "db": "BID",
        "id": "25365"
      },
      {
        "db": "VULHUB",
        "id": "VHN-14141"
      },
      {
        "db": "PACKETSTORM",
        "id": "58746"
      },
      {
        "db": "PACKETSTORM",
        "id": "58735"
      }
    ],
    "trust": 1.71
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-14141",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-14141"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2005-2932",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "25365",
        "trust": 2.0
      },
      {
        "db": "BID",
        "id": "25377",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "26513",
        "trust": 1.8
      },
      {
        "db": "SECTRACK",
        "id": "1018588",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-2929",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "36110",
        "trust": 0.6
      },
      {
        "db": "IDEFENSE",
        "id": "20070820 CHECK POINT ZONE LABS MULTIPLE PRODUCTS PRIVILEGE ESCALATION VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "10805",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "58735",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-14141",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "58746",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-14141"
      },
      {
        "db": "BID",
        "id": "25377"
      },
      {
        "db": "BID",
        "id": "25365"
      },
      {
        "db": "PACKETSTORM",
        "id": "58746"
      },
      {
        "db": "PACKETSTORM",
        "id": "58735"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2932"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ]
  },
  "id": "VAR-200512-0017",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-14141"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:21:06.187000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-14141"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2932"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/25365"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/25377"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1018588"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/26513"
      },
      {
        "trust": 1.7,
        "url": "http://www.reversemode.com/index.php?option=com_remository\u0026itemid=2\u0026func=fileinfo\u0026id=53"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/2929"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36110"
      },
      {
        "trust": 0.7,
        "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585"
      },
      {
        "trust": 0.6,
        "url": "http://www.zonealarm.com"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/36110"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/2929"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/10805"
      },
      {
        "trust": 0.3,
        "url": "http://www.zonelabs.com"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/477155"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/477133"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/477134"
      },
      {
        "trust": 0.1,
        "url": "http://www.reversemode.com/index.php?option=com_remository\u0026amp;itemid=2\u0026amp;func=fileinfo\u0026amp;id=53"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4272/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/150/"
      },
      {
        "trust": 0.1,
        "url": "http://www.zonealarm.com/store/content/catalog/download_buy.jsp?dc=12bms\u0026ctry=us\u0026lang=en"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3057/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4647/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4280/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1960/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/151/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/152/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/5806/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6072/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1961/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6074/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/153/"
      },
      {
        "trust": 0.1,
        "url": "https://psi.secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6073/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4271/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13889/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4648/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6071/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3056/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26513/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/),"
      },
      {
        "trust": 0.1,
        "url": "http://www.zonealarm.com/store/content/catalog/products/trial_zafamily/trial_zafamily.jsp"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-2932"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com/intelligence/vulnerabilities/"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com/methodology/vulnerability/vcp.php"
      },
      {
        "trust": 0.1,
        "url": "http://www.zonelabs.com/"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-14141"
      },
      {
        "db": "BID",
        "id": "25377"
      },
      {
        "db": "BID",
        "id": "25365"
      },
      {
        "db": "PACKETSTORM",
        "id": "58746"
      },
      {
        "db": "PACKETSTORM",
        "id": "58735"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2932"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-14141"
      },
      {
        "db": "BID",
        "id": "25377"
      },
      {
        "db": "BID",
        "id": "25365"
      },
      {
        "db": "PACKETSTORM",
        "id": "58746"
      },
      {
        "db": "PACKETSTORM",
        "id": "58735"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2932"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-14141"
      },
      {
        "date": "2007-04-20T00:00:00",
        "db": "BID",
        "id": "25377"
      },
      {
        "date": "2007-08-20T00:00:00",
        "db": "BID",
        "id": "25365"
      },
      {
        "date": "2007-08-21T20:53:26",
        "db": "PACKETSTORM",
        "id": "58746"
      },
      {
        "date": "2007-08-21T20:08:39",
        "db": "PACKETSTORM",
        "id": "58735"
      },
      {
        "date": "2005-12-31T05:00:00",
        "db": "NVD",
        "id": "CVE-2005-2932"
      },
      {
        "date": "2005-12-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-14141"
      },
      {
        "date": "2008-10-14T16:47:00",
        "db": "BID",
        "id": "25377"
      },
      {
        "date": "2008-10-14T17:57:00",
        "db": "BID",
        "id": "25365"
      },
      {
        "date": "2017-07-11T01:33:02.940000",
        "db": "NVD",
        "id": "CVE-2005-2932"
      },
      {
        "date": "2007-08-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "25377"
      },
      {
        "db": "BID",
        "id": "25365"
      },
      {
        "db": "PACKETSTORM",
        "id": "58746"
      },
      {
        "db": "PACKETSTORM",
        "id": "58735"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ],
    "trust": 1.4
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ZoneAlarm Product Multiple Local Licensing Boosts",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200512-767"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.