Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Try our Premium Alert Service
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service

Category:   Application (Firewall)  >   ZoneAlarm Vendors:   Zone Labs
ZoneLabs ZoneAlarm Pro Desktop Firewall Software May Apply the Wrong Security Settings in Certain Cases
SecurityTracker Alert ID:  1002715
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Updated:  Nov 13 2001
Original Entry Date:  Nov 8 2001
Impact:   Host/resource access via network
Exploit Included:  Yes  
Version(s): 2.6.357; prior versions may also be vulnerable
Description:   SecurityFocus reported a vulnerability in ZoneAlarm Pro. The firewall may apply the incorrect security settings in certain cases.

It is reported that, in certain cases, ZoneAlarm may apply the local Intranet security settings to connections with non-local addresses. If the first two octets of the IP address are identical to those of the local host running ZoneAlarm, the ZoneAlarm firewall will apply the security settings of the local zone.

SecurityFocus notes that this was originally reported by Philip Wagenaar.

Impact:   A connection with a non-local host may be permitted when it is intended to be blocked.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   State error
Underlying OS:  Windows (Me), Windows (NT), Windows (95), Windows (98), Windows (2000), Windows (XP)

Message History:   This archive entry has one or more follow-up message(s) listed below.
(Vendor Believes This is a Configuration Error) Re: ZoneLabs ZoneAlarm Pro Desktop Firewall Software May Apply the Wrong Security Settings in Certain Cases
The vendor believes that there is no vulnerability and that the condition is due to a user-initiated configuration error.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, LLC