var-200708-0097
Vulnerability from variot
vsdatant.sys 6.5.737.0 in Check Point Zone Labs ZoneAlarm before 7.0.362 allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in a METHOD_NEITHER (1) IOCTL 0x8400000F or (2) IOCTL 0x84000013 request, which can be used to overwrite arbitrary memory locations. Multiple Check Point ZoneAlarm products are prone to local privilege-escalation vulnerabilities. An attacker can exploit these issues to gain elevated privileges and completely compromise an affected computer. These issues have been confirmed in: ZoneAlarm 6.5.737 ZoneAlarm Security Suite 5.5.062.004 and 6.5.737. Other versions are likely vulnerable as well. NOTE: This BID is being retired because it is a duplicate of BID 25365 (Check Point Zone Labs Multiple Products Local Privilege Escalation Vulnerabilities). The following are vulnerable: - Versions prior to ZoneAlarm 7.0.362 - Zone Labs products that include 'vsdatant.sys' 6.5.737.0. ZoneAlarm is a personal computer firewall that protects personal data and privacy. There are multiple security vulnerabilities in the implementation and installation of ZoneAlarm, local attackers may use this vulnerability to elevate their own privileges. Since some programs run as system services, attackers can replace the installed ZoneAlarm files with their own code, which will then be executed with system-level privileges.
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.
Download the free PSI BETA from the Secunia website: https://psi.secunia.com/
TITLE: ZoneAlarm Products Insecure Directory Permissions and IOCTL Handler Privilege Escalation
SECUNIA ADVISORY ID: SA26513
VERIFY ADVISORY: http://secunia.com/advisories/26513/
CRITICAL: Less critical
IMPACT: Privilege escalation
WHERE: Local system
SOFTWARE: ZoneAlarm 6.x http://secunia.com/product/5806/ ZoneAlarm 7.x http://secunia.com/product/13889/ ZoneAlarm 5.x http://secunia.com/product/4647/ ZoneAlarm Pro 5.x http://secunia.com/product/4280/ ZoneAlarm Pro 6.x http://secunia.com/product/6071/ ZoneAlarm Security Suite 5.x http://secunia.com/product/4272/ ZoneAlarm 2.x http://secunia.com/product/3056/ ZoneAlarm 3.x http://secunia.com/product/153/ ZoneAlarm 4.x http://secunia.com/product/150/ ZoneAlarm Anti-Spyware 6.x http://secunia.com/product/6073/ ZoneAlarm Antivirus 5.x http://secunia.com/product/4271/ ZoneAlarm Antivirus 6.x http://secunia.com/product/6074/ ZoneAlarm Internet Security Suite 6.x http://secunia.com/product/6072/ ZoneAlarm Plus 3.x http://secunia.com/product/3057/ ZoneAlarm Plus 4.x http://secunia.com/product/151/ ZoneAlarm Pro 2.x http://secunia.com/product/152/ ZoneAlarm Pro 3.x http://secunia.com/product/1960/ ZoneAlarm Pro 4.x http://secunia.com/product/1961/ ZoneAlarm Wireless Security 5.x http://secunia.com/product/4648/
DESCRIPTION: Some vulnerabilities and a security issue have been reported in ZoneAlarm products, which can be exploited by malicious, local users to gain escalated privileges.
1) Insufficient address space verification within the 0x8400000F and 0x84000013 IOCTL handlers of vsdatant.sys and insecure permissions on the "\.\vsdatant" device interface can be exploited to e.g. access the said IOCTL handlers and overwrite arbitrary memory and execute code with kernel privileges.
2) Insecure default Access Control List (ACL) settings when ZoneAlarm tools are installed can be exploited to gain escalated privileges by replacing certain files.
SOLUTION: Update to version 7.0.362. 2) Discovered by an anonymous person and reported via iDefense Labs.
ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585
Reversemode: http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=53
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. BACKGROUND
Zone Alarm products provide security solutions such as anti-virus, firewall, spy-ware, and ad-ware protection. The vsdatant.sys driver, also known as the TrueVector Device Driver, is the core firewall driver in ZoneAlarm products.
http://www.zonelabs.com/
II.
The problems specifically exist within the IOCTL handling code in the vsdatant.sys device driver. The device driver fails to validate user-land supplied addresses passed to IOCTL 0x8400000F and IOCTL 0x84000013.
Since the Irp parameters are not correctly validated, an attacker could utilize these IOCTLs to overwrite arbitrary memory with the constant double-word value of 0x60001 or the contents of a buffer returned from ZwQuerySystemInformation. This includes kernel memory as well as the code segments of running processes.
III. The access control mechanisms under a default installation allow restricted accounts to access the affected device drivers.
IV.
V. WORKAROUND
Changing the access control mechanisms for the affected device drivers will prevent exploitation by restricted accounts.
VI.
http://www.zonealarm.com/store/content/catalog/products/trial_zaFamily/trial_zaFamily.jsp
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-4216 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems.
VIII. DISCLOSURE TIMELINE
12/19/2006 Initial vendor notification 12/20/2006 Initial vendor response 08/20/2007 Coordinated public disclosure
IX. CREDIT
These vulnerabilities were reported to iDefense by Ruben Santamarta of reversemode.com.
Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php
Free tools, research and upcoming events http://labs.idefense.com/
X. LEGAL NOTICES
Copyright \xa9 2007 iDefense, Inc.
Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200708-0097", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "zonealarm", "scope": "eq", "trust": 1.6, "vendor": "checkpoint", "version": "5.0.63.0" }, { "model": "zonealarm", "scope": "eq", "trust": 1.6, "vendor": "checkpoint", "version": "6.1.744.001" }, { "model": "zonealarm", "scope": "lte", "trust": 1.0, "vendor": "checkpoint", "version": "7.0.337.0" }, { "model": "zonealarm", "scope": "lt", "trust": 0.8, "vendor": "check point", "version": "7.0.362" }, { "model": "labs zonealarm security suite", "scope": "eq", "trust": 0.6, "vendor": "zone", "version": "6.5.737" }, { "model": "labs zonealarm security suite", "scope": "eq", "trust": 0.6, "vendor": "zone", "version": "5.5.62" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.6, "vendor": "zone", "version": "6.5.737" }, { "model": "zonealarm", "scope": "eq", "trust": 0.6, "vendor": "checkpoint", "version": "7.0.337.0" }, { "model": "labs zonealarm security suite", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.5.722" }, { "model": "labs zonealarm security suite", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.1.744.000" }, { "model": "labs zonealarm security suite", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.1.737" }, { "model": "labs zonealarm security suite", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.5.062.011" }, { "model": "labs zonealarm security suite", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.5.062" }, { "model": "labs zonealarm security suite", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.5" }, { "model": "labs zonealarm security suite", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.1" }, { "model": "labs zonealarm pro with web filtering", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.5.594" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.0" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.5.062.011" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.5.062" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.1" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.0.590.015" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.5.538.001" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.5" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.0" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "3.1" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "3.0" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "2.6" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "2.4" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "7.0.302.000" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.5.737.000" }, { "model": "labs zonealarm pro", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.1.744.001" }, { "model": "labs zonealarm plus", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.5.538.001" }, { "model": "labs zonealarm plus", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.0" }, { "model": "labs zonealarm internet security suite", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.0" }, { "model": "labs zonealarm for windows xp", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "2.6" }, { "model": "labs zonealarm for windows nt", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.02.6" }, { "model": "labs zonealarm for windows nt", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.02.5" }, { "model": "labs zonealarm for windows nt", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.02.4" }, { "model": "labs zonealarm for windows nt", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.02.3" }, { "model": "labs zonealarm for windows nt", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.02.2" }, { "model": "labs zonealarm for windows nt", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.02.1" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "982.6" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "982.5" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "982.4" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "982.3" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "982.2" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "982.1" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "952.6" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "952.5" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "952.4" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "952.3" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "952.2" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "952.1" }, { "model": "labs zonealarm for windows", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "951.0" }, { "model": "labs zonealarm antivirus", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.0" }, { "model": "labs zonealarm antivirus", "scope": null, "trust": 0.3, "vendor": "zone", "version": null }, { "model": "labs zonealarm anti-spyware", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.1" }, { "model": "labs zonealarm anti-spyware", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.0" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "6.0" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.5.062.011" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "5.1" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.5.538.001" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "4.0" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "3.7.202" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "3.1" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "3.0" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "2.6" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "2.5" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "2.4" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "2.3" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "2.2" }, { "model": "labs zonealarm", "scope": "eq", "trust": 0.3, "vendor": "zone", "version": "2.1" }, { "model": "labs zonealarm", "scope": "ne", "trust": 0.3, "vendor": "zone", "version": "7.0.362" } ], "sources": [ { "db": "BID", "id": "25377" }, { "db": "BID", "id": "25365" }, { "db": "JVNDB", "id": "JVNDB-2007-002472" }, { "db": "NVD", "id": "CVE-2007-4216" }, { "db": "CNNVD", "id": "CNNVD-200708-354" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:checkpoint:zonealarm:6.1.744.001:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:zonealarm:5.0.63.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:checkpoint:zonealarm:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.0.337.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-4216" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ruben Santamarta\u203b ruben@reversemode.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200708-354" } ], "trust": 0.6 }, "cve": "CVE-2007-4216", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2007-4216", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-27578", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-4216", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200708-354", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-27578", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-27578" }, { "db": "JVNDB", "id": "JVNDB-2007-002472" }, { "db": "NVD", "id": "CVE-2007-4216" }, { "db": "CNNVD", "id": "CNNVD-200708-354" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "vsdatant.sys 6.5.737.0 in Check Point Zone Labs ZoneAlarm before 7.0.362 allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in a METHOD_NEITHER (1) IOCTL 0x8400000F or (2) IOCTL 0x84000013 request, which can be used to overwrite arbitrary memory locations. Multiple Check Point ZoneAlarm products are prone to local privilege-escalation vulnerabilities. \nAn attacker can exploit these issues to gain elevated privileges and completely compromise an affected computer. \nThese issues have been confirmed in:\nZoneAlarm 6.5.737\nZoneAlarm Security Suite 5.5.062.004 and 6.5.737. \nOther versions are likely vulnerable as well. \nNOTE: This BID is being retired because it is a duplicate of BID 25365 (Check Point Zone Labs Multiple Products Local Privilege Escalation Vulnerabilities). \nThe following are vulnerable:\n- Versions prior to ZoneAlarm 7.0.362\n- Zone Labs products that include \u0027vsdatant.sys\u0027 6.5.737.0. ZoneAlarm is a personal computer firewall that protects personal data and privacy. There are multiple security vulnerabilities in the implementation and installation of ZoneAlarm, local attackers may use this vulnerability to elevate their own privileges. Since some programs run as system services, attackers can replace the installed ZoneAlarm files with their own code, which will then be executed with system-level privileges. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nDownload the free PSI BETA from the Secunia website:\nhttps://psi.secunia.com/\n\n----------------------------------------------------------------------\n\nTITLE:\nZoneAlarm Products Insecure Directory Permissions and IOCTL Handler\nPrivilege Escalation\n\nSECUNIA ADVISORY ID:\nSA26513\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26513/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nPrivilege escalation\n\nWHERE:\nLocal system\n\nSOFTWARE:\nZoneAlarm 6.x\nhttp://secunia.com/product/5806/\nZoneAlarm 7.x\nhttp://secunia.com/product/13889/\nZoneAlarm 5.x\nhttp://secunia.com/product/4647/\nZoneAlarm Pro 5.x\nhttp://secunia.com/product/4280/\nZoneAlarm Pro 6.x\nhttp://secunia.com/product/6071/\nZoneAlarm Security Suite 5.x\nhttp://secunia.com/product/4272/\nZoneAlarm 2.x\nhttp://secunia.com/product/3056/\nZoneAlarm 3.x\nhttp://secunia.com/product/153/\nZoneAlarm 4.x\nhttp://secunia.com/product/150/\nZoneAlarm Anti-Spyware 6.x\nhttp://secunia.com/product/6073/\nZoneAlarm Antivirus 5.x\nhttp://secunia.com/product/4271/\nZoneAlarm Antivirus 6.x\nhttp://secunia.com/product/6074/\nZoneAlarm Internet Security Suite 6.x\nhttp://secunia.com/product/6072/\nZoneAlarm Plus 3.x\nhttp://secunia.com/product/3057/\nZoneAlarm Plus 4.x\nhttp://secunia.com/product/151/\nZoneAlarm Pro 2.x\nhttp://secunia.com/product/152/\nZoneAlarm Pro 3.x\nhttp://secunia.com/product/1960/\nZoneAlarm Pro 4.x\nhttp://secunia.com/product/1961/\nZoneAlarm Wireless Security 5.x\nhttp://secunia.com/product/4648/\n\nDESCRIPTION:\nSome vulnerabilities and a security issue have been reported in\nZoneAlarm products, which can be exploited by malicious, local users\nto gain escalated privileges. \n\n1) Insufficient address space verification within the 0x8400000F and\n0x84000013 IOCTL handlers of vsdatant.sys and insecure permissions on\nthe \"\\\\.\\vsdatant\" device interface can be exploited to e.g. access\nthe said IOCTL handlers and overwrite arbitrary memory and execute\ncode with kernel privileges. \n\n2) Insecure default Access Control List (ACL) settings when ZoneAlarm\ntools are installed can be exploited to gain escalated privileges by\nreplacing certain files. \n\nSOLUTION:\nUpdate to version 7.0.362. \n2) Discovered by an anonymous person and reported via iDefense Labs. \n\nORIGINAL ADVISORY:\niDefense Labs:\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585\n\nReversemode:\nhttp://www.reversemode.com/index.php?option=com_remository\u0026Itemid=2\u0026func=fileinfo\u0026id=53\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. BACKGROUND\n\nZone Alarm products provide security solutions such as anti-virus,\nfirewall, spy-ware, and ad-ware protection. The vsdatant.sys driver,\nalso known as the TrueVector Device Driver, is the core firewall driver\nin ZoneAlarm products. \n\nhttp://www.zonelabs.com/\n\nII. \n\nThe problems specifically exist within the IOCTL handling code in the\nvsdatant.sys device driver. The device driver fails to validate\nuser-land supplied addresses passed to IOCTL 0x8400000F and IOCTL\n0x84000013. \n\nSince the Irp parameters are not correctly validated, an attacker could\nutilize these IOCTLs to overwrite arbitrary memory with the constant\ndouble-word value of 0x60001 or the contents of a buffer returned from\nZwQuerySystemInformation. This includes kernel memory as well as the\ncode segments of running processes. \n\nIII. The access control mechanisms under a default installation\nallow restricted accounts to access the affected device drivers. \n\nIV. \n\nV. WORKAROUND\n\nChanging the access control mechanisms for the affected device drivers\nwill prevent exploitation by restricted accounts. \n\nVI. \n\nhttp://www.zonealarm.com/store/content/catalog/products/trial_zaFamily/trial_zaFamily.jsp\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CVE-2007-4216 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org/), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n12/19/2006 Initial vendor notification\n12/20/2006 Initial vendor response\n08/20/2007 Coordinated public disclosure\n\nIX. CREDIT\n\nThese vulnerabilities were reported to iDefense by Ruben Santamarta of\nreversemode.com. \n\nGet paid for vulnerability research\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\n\nFree tools, research and upcoming events\nhttp://labs.idefense.com/\n\nX. LEGAL NOTICES\n\nCopyright \\xa9 2007 iDefense, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDefense. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically,\nplease e-mail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \n There are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct,\nindirect, or consequential loss or damage arising from use of, or\nreliance on, this information", "sources": [ { "db": "NVD", "id": "CVE-2007-4216" }, { "db": "JVNDB", "id": "JVNDB-2007-002472" }, { "db": "BID", "id": "25377" }, { "db": "BID", "id": "25365" }, { "db": "VULHUB", "id": "VHN-27578" }, { "db": "PACKETSTORM", "id": "58746" }, { "db": "PACKETSTORM", "id": "58736" } ], "trust": 2.43 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-27578", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-27578" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-4216", "trust": 3.2 }, { "db": "BID", "id": "25365", "trust": 2.0 }, { "db": "BID", "id": "25377", "trust": 2.0 }, { "db": "SECUNIA", "id": "26513", "trust": 1.8 }, { "db": "SECTRACK", "id": "1018589", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2007-2929", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-002472", "trust": 0.8 }, { "db": "IDEFENSE", "id": "20070820 CHECK POINT ZONE LABS VSDATANT MULTIPLE IOCTL PRIVILEGE ESCALATION VULNERABILITIES", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20070820 [REVERSEMODE ADVISORY] CHECKPOINT ZONELABS VSDATANT.SYS MULTIPLE LOCAL PRIVILEGE ESCALATION VULNERABILITIES", "trust": 0.6 }, { "db": "XF", "id": "36107", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200708-354", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "58736", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-27578", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "58746", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-27578" }, { "db": "BID", "id": "25377" }, { "db": "BID", "id": "25365" }, { "db": "JVNDB", "id": "JVNDB-2007-002472" }, { "db": "PACKETSTORM", "id": "58746" }, { "db": "PACKETSTORM", "id": "58736" }, { "db": "NVD", "id": "CVE-2007-4216" }, { "db": "CNNVD", "id": "CNNVD-200708-354" } ] }, "id": "VAR-200708-0097", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-27578" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:21:06.146000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.checkpoint.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002472" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-27578" }, { "db": "JVNDB", "id": "JVNDB-2007-002472" }, { "db": "NVD", "id": "CVE-2007-4216" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/25365" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/25377" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1018589" }, { "trust": 1.7, "url": "http://secunia.com/advisories/26513" }, { "trust": 1.7, "url": "http://www.reversemode.com/index.php?option=com_remository\u0026itemid=2\u0026func=fileinfo\u0026id=53" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/477155/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/2929" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36107" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4216" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4216" }, { "trust": 0.7, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584" }, { "trust": 0.6, "url": "http://www.zonealarm.com" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/36107" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/477155/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/2929" }, { "trust": 0.3, "url": "http://www.zonelabs.com" }, { "trust": 0.3, "url": "/archive/1/477155" }, { "trust": 0.3, "url": "/archive/1/477133" }, { "trust": 0.3, "url": "/archive/1/477134" }, { "trust": 0.1, "url": "http://www.reversemode.com/index.php?option=com_remository\u0026amp;itemid=2\u0026amp;func=fileinfo\u0026amp;id=53" }, { "trust": 0.1, "url": "http://secunia.com/product/4272/" }, { "trust": 0.1, "url": "http://secunia.com/product/150/" }, { "trust": 0.1, "url": "http://www.zonealarm.com/store/content/catalog/download_buy.jsp?dc=12bms\u0026ctry=us\u0026lang=en" }, { "trust": 0.1, "url": "http://secunia.com/product/3057/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/4647/" }, { "trust": 0.1, "url": "http://secunia.com/product/4280/" }, { "trust": 0.1, "url": "http://secunia.com/product/1960/" }, { "trust": 0.1, "url": "http://secunia.com/product/151/" }, { "trust": 0.1, "url": "http://secunia.com/product/152/" }, { "trust": 0.1, "url": "http://secunia.com/product/5806/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6072/" }, { "trust": 0.1, "url": "http://secunia.com/product/1961/" }, { "trust": 0.1, "url": "http://secunia.com/product/6074/" }, { "trust": 0.1, "url": "http://secunia.com/product/153/" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/6073/" }, { "trust": 0.1, "url": "http://secunia.com/product/4271/" }, { "trust": 0.1, "url": "http://secunia.com/product/13889/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/4648/" }, { "trust": 0.1, "url": "http://secunia.com/product/6071/" }, { "trust": 0.1, "url": "http://secunia.com/product/3056/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/26513/" }, { "trust": 0.1, "url": "http://cve.mitre.org/)," }, { "trust": 0.1, "url": "http://www.zonealarm.com/store/content/catalog/products/trial_zafamily/trial_zafamily.jsp" }, { "trust": 0.1, "url": "http://labs.idefense.com/intelligence/vulnerabilities/" }, { "trust": 0.1, "url": "http://labs.idefense.com/methodology/vulnerability/vcp.php" }, { "trust": 0.1, "url": "http://www.zonelabs.com/" }, { "trust": 0.1, "url": "http://labs.idefense.com/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4216" } ], "sources": [ { "db": "VULHUB", "id": "VHN-27578" }, { "db": "BID", "id": "25377" }, { "db": "BID", "id": "25365" }, { "db": "JVNDB", "id": "JVNDB-2007-002472" }, { "db": "PACKETSTORM", "id": "58746" }, { "db": "PACKETSTORM", "id": "58736" }, { "db": "NVD", "id": "CVE-2007-4216" }, { "db": "CNNVD", "id": "CNNVD-200708-354" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-27578" }, { "db": "BID", "id": "25377" }, { "db": "BID", "id": "25365" }, { "db": "JVNDB", "id": "JVNDB-2007-002472" }, { "db": "PACKETSTORM", "id": "58746" }, { "db": "PACKETSTORM", "id": "58736" }, { "db": "NVD", "id": "CVE-2007-4216" }, { "db": "CNNVD", "id": "CNNVD-200708-354" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-08-21T00:00:00", "db": "VULHUB", "id": "VHN-27578" }, { "date": "2007-04-20T00:00:00", "db": "BID", "id": "25377" }, { "date": "2007-08-20T00:00:00", "db": "BID", "id": "25365" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-002472" }, { "date": "2007-08-21T20:53:26", "db": "PACKETSTORM", "id": "58746" }, { "date": "2007-08-21T20:09:51", "db": "PACKETSTORM", "id": "58736" }, { "date": "2007-08-21T17:17:00", "db": "NVD", "id": "CVE-2007-4216" }, { "date": "2007-08-21T00:00:00", "db": "CNNVD", "id": "CNNVD-200708-354" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-15T00:00:00", "db": "VULHUB", "id": "VHN-27578" }, { "date": "2008-10-14T16:47:00", "db": "BID", "id": "25377" }, { "date": "2008-10-14T17:57:00", "db": "BID", "id": "25365" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-002472" }, { "date": "2018-10-15T21:33:57.103000", "db": "NVD", "id": "CVE-2007-4216" }, { "date": "2007-08-22T00:00:00", "db": "CNNVD", "id": "CNNVD-200708-354" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "25377" }, { "db": "BID", "id": "25365" }, { "db": "PACKETSTORM", "id": "58746" }, { "db": "PACKETSTORM", "id": "58736" }, { "db": "CNNVD", "id": "CNNVD-200708-354" } ], "trust": 1.4 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Check Point Zone Labs ZoneAlarm of vsdatant.sys Vulnerability gained in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-002472" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200708-354" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.