ID

VAR-200502-0086


CVE

CVE-2005-0114


TITLE

ZoneAlarm 5.1 Illegal pointer discards local denial of service vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200502-047

DESCRIPTION

vsdatant.sys in Zone Lab ZoneAlarm before 5.5.062.011, ZoneAlarm Wireless before 5.5.080.000, Check Point Integrity Client 4.x before 4.5.122.000 and 5.x before 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid memory address, which allows local users to cause a denial of service (system crash) when ZoneAlarm attempts to dereference an invalid pointer. Multiple ZoneAlarm products and Check Point Integrity Client are reported prone to a local denial of service vulnerability. This issue exists due to an invalid pointer dereference. A successful attack can result in a denial of service condition in the kernel. ZoneAlarm Security Suite, ZoneAlarm Pro, and ZoneAlarm versions prior to 5.5.062.011 and Check Point Integrity Client versions prior to 4.5.122.000 and 5.1.556.166 are considered vulnerable to this issue. ZoneAlarm is a popular desktop firewall system. BACKGROUND Zone Labs ZoneAlarm provides personal firewall protection. More information is available from: http://www.zonelabs.com/ II. ZoneAlarm offers process specific protection by hooking the kernel API routine NtConnectPort(). NtConnectPort() is used by programs to implement advanced inter-process communication (IPC). The NtConnectPort() function is declared as follows: NtConnectPort( OUT PHANDLE ClientPortHandle, IN PUNICODE_STRING ServerPortName, IN PSECURITY_QUALITY_OF_SERVICE SecurityQos, IN OUT PLPC_SECTION_OWNER_MEMORY ClientSharedMemory OPTIONAL, OUT PLPC_SECTION_MEMORY ServerSharedMemory OPTIONAL, OUT PULONG MaximumMessageLength OPTIONAL, IN OUT PVOID ConnectionInfo OPTIONAL, IN OUT PULONG ConnectionInfoLength OPTIONAL); The problem specifically exists within vsdatant.sys as ZoneAlarm fails to verify the second argument. 'ServerPortName' is a valid address prior to derefencing it as a pointer. The vulnerable section of code is displayed here: 0001EE93 mov esi, [esp+108h+ServerPortName] 0001EE9A mov edi, eax 0001EE9C test esi, esi 0001EE9E jz short loc_1EEB6 0001EEA0 mov edx, [esi+4] The argument 'ServerPortName' is stored in the register ESI. A check is made to ensure that the value is not NULL. Any non-zero invalid memory address can be passed as the second argument to NtConnectPort(), resulting in a system crash. III. ANALYSIS Exploitation allows local and remote attackers who have exploited another vulnerability to trigger a DoS in kernel space, resulting in a "blue screen of death." IV. DETECTION iDEFENSE has confirmed the existence of this vulnerability in ZoneAlarm version 5.1. It is suspected that previous versions of ZoneAlarm are vulnerable as well. V. WORKAROUND iDEFENSE is currently unaware of any workarounds for this issue. VI. VENDOR RESPONSE A vendor advisory for this issue is available at: http://download.zonelabs.com/bin/free/securityAlert/19.html VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the names CAN-2005-0114 to these issues. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 01/06/2005 Initial vendor notification 01/07/2005 Initial vendor response 02/11/2005 Coordinated public disclosure IX. CREDIT iDEFENSE Labs is credited with this discovery. Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp X. LEGAL NOTICES Copyright (c) 2005 iDEFENSE, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDEFENSE. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Trust: 1.44

sources: NVD: CVE-2005-0114 // BID: 12531 // VULHUB: VHN-11323 // VULMON: CVE-2005-0114 // PACKETSTORM: 36163

AFFECTED PRODUCTS

vendor:checkpointmodel:check point integrity clientscope:lteversion:5.1.556.166

Trust: 1.0

vendor:zonelabsmodel:zonealarm wireless securityscope:lteversion:5.5.080.000

Trust: 1.0

vendor:checkpointmodel:check point integrity clientscope:eqversion:4.5.122.000

Trust: 1.0

vendor:zonelabsmodel:zonealarmscope:eqversion:5.5.062.011

Trust: 1.0

vendor:zonelabsmodel:zonealarm wireless securityscope:eqversion:5.5.080.000

Trust: 0.6

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5.062

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.1

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.5.062

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.1

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.0.590.015

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:4.5.538.001

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:4.5

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:4.0

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:3.1

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:3.0

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:2.4

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:5.1

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:4.5.538.001

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:4.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:3.7.202

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:3.1

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:3.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.5

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.4

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.3

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.2

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.1

Trust: 0.3

vendor:checkmodel:point software integrity clientscope:eqversion:5.0

Trust: 0.3

vendor:checkmodel:point software integrity clientscope:eqversion:4.5

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:neversion:5.5.062.011

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:neversion:5.5.062.011

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:neversion:5.5.062.011

Trust: 0.3

vendor:checkmodel:point software integrity clientscope:neversion:5.1.556.166

Trust: 0.3

vendor:checkmodel:point software integrity clientscope:neversion:4.4.122.000

Trust: 0.3

sources: BID: 12531 // CNNVD: CNNVD-200502-047 // NVD: CVE-2005-0114

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-0114
value: LOW

Trust: 1.0

CNNVD: CNNVD-200502-047
value: LOW

Trust: 0.6

VULHUB: VHN-11323
value: LOW

Trust: 0.1

VULMON: CVE-2005-0114
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2005-0114
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-11323
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-11323 // VULMON: CVE-2005-0114 // CNNVD: CNNVD-200502-047 // NVD: CVE-2005-0114

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-0114

THREAT TYPE

local

Trust: 1.0

sources: BID: 12531 // PACKETSTORM: 36163 // CNNVD: CNNVD-200502-047

TYPE

Design Error

Trust: 0.9

sources: BID: 12531 // CNNVD: CNNVD-200502-047

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-11323

EXTERNAL IDS

db:NVDid:CVE-2005-0114

Trust: 2.2

db:BIDid:12531

Trust: 2.1

db:SECUNIAid:14256

Trust: 1.8

db:CNNVDid:CNNVD-200502-047

Trust: 0.7

db:IDEFENSEid:20050211 ZONEALARM 5.1 INVALID POINTER DEREFERENCE VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:36163

Trust: 0.2

db:VULHUBid:VHN-11323

Trust: 0.1

db:VULMONid:CVE-2005-0114

Trust: 0.1

sources: VULHUB: VHN-11323 // VULMON: CVE-2005-0114 // BID: 12531 // PACKETSTORM: 36163 // CNNVD: CNNVD-200502-047 // NVD: CVE-2005-0114

REFERENCES

url:http://www.securityfocus.com/bid/12531

Trust: 1.9

url:http://download.zonelabs.com/bin/free/securityalert/19.html

Trust: 1.9

url:http://secunia.com/advisories/14256

Trust: 1.8

url:http://www.idefense.com/application/poi/display?id=199&type=vulnerabilities

Trust: 1.8

url:http://www.zonelabs.com

Trust: 0.3

url:/archive/1/390199

Trust: 0.3

url:/archive/1/390198

Trust: 0.3

url:http://www.idefense.com/application/poi/display?id=199&type=vulnerabilities

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://www.idefense.com/poi/teams/vcp.jsp

Trust: 0.1

url:http://www.zonelabs.com/

Trust: 0.1

url:http://cve.mitre.org),

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-0114

Trust: 0.1

sources: VULHUB: VHN-11323 // VULMON: CVE-2005-0114 // BID: 12531 // PACKETSTORM: 36163 // CNNVD: CNNVD-200502-047 // NVD: CVE-2005-0114

CREDITS

Discovery is credited to iDEFENSE Labs.

Trust: 0.3

sources: BID: 12531

SOURCES

db:VULHUBid:VHN-11323
db:VULMONid:CVE-2005-0114
db:BIDid:12531
db:PACKETSTORMid:36163
db:CNNVDid:CNNVD-200502-047
db:NVDid:CVE-2005-0114

LAST UPDATE DATE

2024-08-14T15:45:43.244000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-11323date:2008-09-05T00:00:00
db:VULMONid:CVE-2005-0114date:2008-09-05T00:00:00
db:BIDid:12531date:2009-07-12T10:06:00
db:CNNVDid:CNNVD-200502-047date:2005-10-20T00:00:00
db:NVDid:CVE-2005-0114date:2008-09-05T20:45:21.747

SOURCES RELEASE DATE

db:VULHUBid:VHN-11323date:2005-02-11T00:00:00
db:VULMONid:CVE-2005-0114date:2005-02-11T00:00:00
db:BIDid:12531date:2005-02-11T00:00:00
db:PACKETSTORMid:36163date:2005-02-24T16:48:40
db:CNNVDid:CNNVD-200502-047date:2005-02-11T00:00:00
db:NVDid:CVE-2005-0114date:2005-02-11T05:00:00