ID

VAR-200512-0017


CVE

CVE-2005-2932


TITLE

ZoneAlarm Product Multiple Local Licensing Boosts

Trust: 0.6

sources: CNNVD: CNNVD-200512-767

DESCRIPTION

Multiple Check Point Zone Labs ZoneAlarm products before 7.0.362, including ZoneAlarm Security Suite 5.5.062.004 and 6.5.737, use insecure default permissions for critical files, which allows local users to gain privileges or bypass security controls. Multiple Check Point ZoneAlarm products are prone to local privilege-escalation vulnerabilities. An attacker can exploit these issues to gain elevated privileges and completely compromise an affected computer. These issues have been confirmed in: ZoneAlarm 6.5.737 ZoneAlarm Security Suite 5.5.062.004 and 6.5.737. Other versions are likely vulnerable as well. The following are vulnerable: - Versions prior to ZoneAlarm 7.0.362 - Zone Labs products that include 'vsdatant.sys' 6.5.737.0. ZoneAlarm is a personal computer firewall that protects personal data and privacy. The IOCTL handling code of the ZoneAlarm product vsdatant.sys device driver does not validate the userland-supplied addresses passed to IOCTL 0x8400000F and IOCTL 0x84000013. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: ZoneAlarm Products Insecure Directory Permissions and IOCTL Handler Privilege Escalation SECUNIA ADVISORY ID: SA26513 VERIFY ADVISORY: http://secunia.com/advisories/26513/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: ZoneAlarm 6.x http://secunia.com/product/5806/ ZoneAlarm 7.x http://secunia.com/product/13889/ ZoneAlarm 5.x http://secunia.com/product/4647/ ZoneAlarm Pro 5.x http://secunia.com/product/4280/ ZoneAlarm Pro 6.x http://secunia.com/product/6071/ ZoneAlarm Security Suite 5.x http://secunia.com/product/4272/ ZoneAlarm 2.x http://secunia.com/product/3056/ ZoneAlarm 3.x http://secunia.com/product/153/ ZoneAlarm 4.x http://secunia.com/product/150/ ZoneAlarm Anti-Spyware 6.x http://secunia.com/product/6073/ ZoneAlarm Antivirus 5.x http://secunia.com/product/4271/ ZoneAlarm Antivirus 6.x http://secunia.com/product/6074/ ZoneAlarm Internet Security Suite 6.x http://secunia.com/product/6072/ ZoneAlarm Plus 3.x http://secunia.com/product/3057/ ZoneAlarm Plus 4.x http://secunia.com/product/151/ ZoneAlarm Pro 2.x http://secunia.com/product/152/ ZoneAlarm Pro 3.x http://secunia.com/product/1960/ ZoneAlarm Pro 4.x http://secunia.com/product/1961/ ZoneAlarm Wireless Security 5.x http://secunia.com/product/4648/ DESCRIPTION: Some vulnerabilities and a security issue have been reported in ZoneAlarm products, which can be exploited by malicious, local users to gain escalated privileges. 1) Insufficient address space verification within the 0x8400000F and 0x84000013 IOCTL handlers of vsdatant.sys and insecure permissions on the "\\.\vsdatant" device interface can be exploited to e.g. access the said IOCTL handlers and overwrite arbitrary memory and execute code with kernel privileges. SOLUTION: Update to version 7.0.362. http://www.zonealarm.com/store/content/catalog/download_buy.jsp?dc=12bms&ctry=US&lang=en PROVIDED AND/OR DISCOVERED BY: 1) Ruben Santamarta, reported via iDefense Labs. 2) Discovered by an anonymous person and reported via iDefense Labs. ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585 Reversemode: http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=53 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . BACKGROUND Zone Alarm products provide security solutions such as anti-virus, firewall, spy-ware, and ad-ware protection. http://www.zonelabs.com/ II. The vulnerability specifically exists in the default file Access Control List (ACL) settings that are applied during installation. When an administrator installs any of the Zone Labs ZoneAlarm tools, the default ACL allows any user to modify the installed files. Some of the programs run as system services. This allows a user to simply replace an installed ZoneAlarm file with their own code that will later be executed with system-level privileges. III. ANALYSIS Exploitation allows local attackers to escalate privileges to the system level. It is also possible to use this vulnerability to simply disable protection by moving all of the executable files so that they cannot start on a reboot. IV. V. WORKAROUND Apply proper Access Control List settings to the directory that ZoneAlarm Security Suite is installed in. The ACL rules should make sure that no regular users can modify files in the directory. VI. http://www.zonealarm.com/store/content/catalog/products/trial_zaFamily/trial_zaFamily.jsp VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2005-2932 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 09/29/2005 Initial vendor notification 09/29/2005 Initial vendor response 10/19/2006 Second vendor notification 08/20/2007 Coordinated public disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2007 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Trust: 1.71

sources: NVD: CVE-2005-2932 // BID: 25377 // BID: 25365 // VULHUB: VHN-14141 // PACKETSTORM: 58746 // PACKETSTORM: 58735

AFFECTED PRODUCTS

vendor:checkpointmodel:zonealarm security suitescope:eqversion:6.5.737

Trust: 1.6

vendor:checkpointmodel:zonealarm security suitescope:eqversion:5.5.062.004

Trust: 1.6

vendor:checkpointmodel:zonealarmscope:lteversion:7.0.337.0

Trust: 1.0

vendor:zonemodel:labs zonealarm security suitescope:eqversion:6.5.737

Trust: 0.6

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5.62

Trust: 0.6

vendor:zonemodel:labs zonealarmscope:eqversion:6.5.737

Trust: 0.6

vendor:checkpointmodel:zonealarmscope:eqversion:7.0.337.0

Trust: 0.6

vendor:zonemodel:labs zonealarm security suitescope:eqversion:6.5.722

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:6.1.744.000

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:6.1.737

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5.062.011

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5.062

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.5

Trust: 0.3

vendor:zonemodel:labs zonealarm security suitescope:eqversion:5.1

Trust: 0.3

vendor:zonemodel:labs zonealarm pro with web filteringscope:eqversion:4.5.594

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.5.062.011

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.5.062

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.1

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:5.0.590.015

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:4.5.538.001

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:4.5

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:4.0

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:3.1

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:3.0

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:2.4

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:7.0.302.000

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:6.5.737.000

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:6.1.744.001

Trust: 0.3

vendor:zonemodel:labs zonealarm plusscope:eqversion:4.5.538.001

Trust: 0.3

vendor:zonemodel:labs zonealarm plusscope:eqversion:4.0

Trust: 0.3

vendor:zonemodel:labs zonealarm internet security suitescope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows xpscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.6

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.5

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.4

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.3

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.2

Trust: 0.3

vendor:zonemodel:labs zonealarm for windows ntscope:eqversion:4.02.1

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.6

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.5

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.4

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.3

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.2

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:982.1

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.6

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.5

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.4

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.3

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.2

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:952.1

Trust: 0.3

vendor:zonemodel:labs zonealarm for windowsscope:eqversion:951.0

Trust: 0.3

vendor:zonemodel:labs zonealarm antivirusscope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarm antivirusscope: - version: -

Trust: 0.3

vendor:zonemodel:labs zonealarm anti-spywarescope:eqversion:6.1

Trust: 0.3

vendor:zonemodel:labs zonealarm anti-spywarescope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:6.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:5.5.062.011

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:5.1

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:4.5.538.001

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:4.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:3.7.202

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:3.1

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:3.0

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.5

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.4

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.3

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.2

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.1

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:neversion:7.0.362

Trust: 0.3

sources: BID: 25377 // BID: 25365 // CNNVD: CNNVD-200512-767 // NVD: CVE-2005-2932

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2932
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200512-767
value: HIGH

Trust: 0.6

VULHUB: VHN-14141
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-2932
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14141
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14141 // CNNVD: CNNVD-200512-767 // NVD: CVE-2005-2932

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.1

sources: VULHUB: VHN-14141 // NVD: CVE-2005-2932

THREAT TYPE

local

Trust: 1.4

sources: BID: 25377 // BID: 25365 // PACKETSTORM: 58746 // PACKETSTORM: 58735 // CNNVD: CNNVD-200512-767

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200512-767

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-14141

EXTERNAL IDS

db:NVDid:CVE-2005-2932

Trust: 2.4

db:BIDid:25365

Trust: 2.0

db:BIDid:25377

Trust: 2.0

db:SECUNIAid:26513

Trust: 1.8

db:SECTRACKid:1018588

Trust: 1.7

db:VUPENid:ADV-2007-2929

Trust: 1.7

db:CNNVDid:CNNVD-200512-767

Trust: 0.7

db:XFid:36110

Trust: 0.6

db:IDEFENSEid:20070820 CHECK POINT ZONE LABS MULTIPLE PRODUCTS PRIVILEGE ESCALATION VULNERABILITY

Trust: 0.6

db:NSFOCUSid:10805

Trust: 0.6

db:PACKETSTORMid:58735

Trust: 0.2

db:VULHUBid:VHN-14141

Trust: 0.1

db:PACKETSTORMid:58746

Trust: 0.1

sources: VULHUB: VHN-14141 // BID: 25377 // BID: 25365 // PACKETSTORM: 58746 // PACKETSTORM: 58735 // CNNVD: CNNVD-200512-767 // NVD: CVE-2005-2932

REFERENCES

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584

Trust: 2.4

url:http://www.securityfocus.com/bid/25365

Trust: 1.7

url:http://www.securityfocus.com/bid/25377

Trust: 1.7

url:http://securitytracker.com/id?1018588

Trust: 1.7

url:http://secunia.com/advisories/26513

Trust: 1.7

url:http://www.reversemode.com/index.php?option=com_remository&itemid=2&func=fileinfo&id=53

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2929

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36110

Trust: 1.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585

Trust: 0.7

url:http://www.zonealarm.com

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/36110

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2929

Trust: 0.6

url:http://www.nsfocus.net/vulndb/10805

Trust: 0.6

url:http://www.zonelabs.com

Trust: 0.3

url:/archive/1/477155

Trust: 0.3

url:/archive/1/477133

Trust: 0.3

url:/archive/1/477134

Trust: 0.3

url:http://www.reversemode.com/index.php?option=com_remository&itemid=2&func=fileinfo&id=53

Trust: 0.1

url:http://secunia.com/product/4272/

Trust: 0.1

url:http://secunia.com/product/150/

Trust: 0.1

url:http://www.zonealarm.com/store/content/catalog/download_buy.jsp?dc=12bms&ctry=us&lang=en

Trust: 0.1

url:http://secunia.com/product/3057/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/4647/

Trust: 0.1

url:http://secunia.com/product/4280/

Trust: 0.1

url:http://secunia.com/product/1960/

Trust: 0.1

url:http://secunia.com/product/151/

Trust: 0.1

url:http://secunia.com/product/152/

Trust: 0.1

url:http://secunia.com/product/5806/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6072/

Trust: 0.1

url:http://secunia.com/product/1961/

Trust: 0.1

url:http://secunia.com/product/6074/

Trust: 0.1

url:http://secunia.com/product/153/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/6073/

Trust: 0.1

url:http://secunia.com/product/4271/

Trust: 0.1

url:http://secunia.com/product/13889/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4648/

Trust: 0.1

url:http://secunia.com/product/6071/

Trust: 0.1

url:http://secunia.com/product/3056/

Trust: 0.1

url:http://secunia.com/advisories/26513/

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://www.zonealarm.com/store/content/catalog/products/trial_zafamily/trial_zafamily.jsp

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2932

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://www.zonelabs.com/

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

sources: VULHUB: VHN-14141 // BID: 25377 // BID: 25365 // PACKETSTORM: 58746 // PACKETSTORM: 58735 // CNNVD: CNNVD-200512-767 // NVD: CVE-2005-2932

CREDITS

Ruben Santamarta ruben@reversemode.com

Trust: 0.6

sources: CNNVD: CNNVD-200512-767

SOURCES

db:VULHUBid:VHN-14141
db:BIDid:25377
db:BIDid:25365
db:PACKETSTORMid:58746
db:PACKETSTORMid:58735
db:CNNVDid:CNNVD-200512-767
db:NVDid:CVE-2005-2932

LAST UPDATE DATE

2024-08-14T14:35:41.820000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14141date:2017-07-11T00:00:00
db:BIDid:25377date:2008-10-14T16:47:00
db:BIDid:25365date:2008-10-14T17:57:00
db:CNNVDid:CNNVD-200512-767date:2007-08-21T00:00:00
db:NVDid:CVE-2005-2932date:2017-07-11T01:33:02.940

SOURCES RELEASE DATE

db:VULHUBid:VHN-14141date:2005-12-31T00:00:00
db:BIDid:25377date:2007-04-20T00:00:00
db:BIDid:25365date:2007-08-20T00:00:00
db:PACKETSTORMid:58746date:2007-08-21T20:53:26
db:PACKETSTORMid:58735date:2007-08-21T20:08:39
db:CNNVDid:CNNVD-200512-767date:2005-12-31T00:00:00
db:NVDid:CVE-2005-2932date:2005-12-31T05:00:00