Vulnerabilities > Zonelabs > Zonealarm

DATE CVE VULNERABILITY TITLE RISK
2007-09-24 CVE-2007-5044 Permissions, Privileges, and Access Controls vulnerability in Zonelabs Zonealarm 7.0.362.000
ZoneAlarm Pro 7.0.362.000 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via the (1) NtCreatePort and (2) NtDeleteFile kernel SSDT hooks, a partial regression of CVE-2007-2083.
6.9
2007-05-02 CVE-2007-2467 Denial of Service vulnerability in Zonelabs Zonealarm 6.1.744.001/6.5.737.000
ZoneAlarm Pro 6.5.737.000, 6.1.744.001, and possibly earlier versions and other products, allows local users to cause a denial of service (system crash) by sending malformed data to the vsdatant device driver, which causes an invalid memory access.
local
low complexity
zonelabs
4.9
2007-04-18 CVE-2007-2083 Unspecified vulnerability in Zonelabs Zonealarm
vsdatant.sys in Check Point Zone Labs ZoneAlarm Pro before 7.0.302.000 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (system crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateKey and (2) NtDeleteFile functions.
local
zonelabs
6.9
2007-01-19 CVE-2007-0351 Local Security vulnerability in Microsoft Windows
Microsoft Windows XP and Windows Server 2003 do not properly handle user logoff, which might allow local users to gain the privileges of a previous system user, possibly related to user profile unload failure.
local
high complexity
microsoft zonelabs
6.2
2005-11-16 CVE-2005-3560 Unspecified vulnerability in Zonelabs products
Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags.
network
low complexity
zonelabs
7.5
2005-05-24 CVE-2005-1693 Integer overflow in Computer Associates Vet Antivirus library, as used by CA InoculateIT 6.0, eTrust Antivirus r6.0 through 7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, BrightStor ARCserve Backup (BAB) r11.1, Vet Antivirus, Zonelabs ZoneAlarm Security Suite, and ZoneAlarm Antivirus, allows remote attackers to gain privileges via a compressed VBA directory with a project name length of -1, which leads to a heap-based buffer overflow.
network
low complexity
broadcom ca zonelabs
critical
10.0
2005-02-11 CVE-2005-0114 Local Denial of Service vulnerability in Zone Labs ZoneAlarm
vsdatant.sys in Zone Lab ZoneAlarm before 5.5.062.011, ZoneAlarm Wireless before 5.5.080.000, Check Point Integrity Client 4.x before 4.5.122.000 and 5.x before 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid memory address, which allows local users to cause a denial of service (system crash) when ZoneAlarm attempts to dereference an invalid pointer.
local
low complexity
checkpoint zonelabs
2.1
2004-12-31 CVE-2004-1534 Remote Ad-Blocking Denial Of Service vulnerability in Zone Labs ZoneAlarm
ZoneAlarm and ZoneAlarm Pro before 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript.
network
low complexity
zonelabs
5.0
2004-12-06 CVE-2004-0612 Security Bypass vulnerability in Zonelabs Zonealarm 5.0.590.015
The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote attackers to bypass the mobile code filtering.
network
high complexity
zonelabs
5.1
2004-11-23 CVE-2004-0309 Remote Buffer Overflow vulnerability in Zone Labs ZoneAlarm SMTP
Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument.
network
low complexity
zonelabs
critical
10.0