Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2001-1548

Overview

Vulnerability Score 2.1 2.1
CVE Id CVE-2001-1548
Last Modified 05 Sep 2008 04:26:49
Published 31 Dec 2001 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2001-1548

Summary

ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.

Vulnerable Systems

Application

  • Zonelabs Zonealarm 2.1

  • Zonelabs Zonealarm 2.2

  • Zonelabs Zonealarm 2.3

  • Zonelabs Zonealarm 2.4

  • Zonelabs Zonealarm 2.5

  • Zonelabs Zonealarm 2.6


References

BID - 3647

XF - zonealarm-tiny-bypass-filter(7671)

BUGTRAQ - 20011206 Re: Flawed outbound packet filtering in various personal firewalls

BUGTRAQ - 20011205 Flawed outbound packet filtering in various personal firewalls


Last Updated: 27 May 2016 10:36:42