Zonelabs

Zonealarm

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 26.69%
  • Veröffentlicht 23.11.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCP...

  • EPSS 0.36%
  • Veröffentlicht 14.04.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote attackers to bypass e-mail protection via attachments whose names contain certain non-English characters.

Exploit
  • EPSS 1.13%
  • Veröffentlicht 31.12.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The DeviceIoControl function in the TrueVector Device Driver (VSDATANT) in ZoneAlarm before 3.7.211, Pro before 4.0.146.029, and Plus before 4.0.146.029 allows local users to gain privileges via certain signals (aka "Device Driver Attack").

  • EPSS 0.91%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ZoneAlarm Pro 3.0 MailSafe allows remote attackers to bypass filtering and possibly execute arbitrary code via email attachments containing a trailing dot after the file extension.

Exploit
  • EPSS 6.28%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ZoneAlarm Pro 3.0 and 3.1, when configured to block all traffic, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of SYN packets (SYN flood). NOTE: the vendor was not able to reproduce the issue.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 31.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.

  • EPSS 0.13%
  • Veröffentlicht 29.08.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ZoneAlarm and ZoneAlarm Pro allows a local attacker to cause a denial of service by running a trojan to initialize a ZoneAlarm mutex object which prevents ZoneAlarm from starting.

  • EPSS 0.56%
  • Veröffentlicht 18.07.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

MailSafe in Zone Labs ZoneAlarm 2.6 and earlier and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote attackers to send potentially dangerous attachments.

  • EPSS 3.36%
  • Veröffentlicht 24.04.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules.

  • EPSS 0.61%
  • Veröffentlicht 24.02.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event.