[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8D8863BB65A02F47A303E5B7666126710114751B@exmb1.zonelabs.com>
Date: Wed, 18 Feb 2004 16:33:05 -0800
From: "Zone Labs Product Security" <Product-Security@...elabs.com>
To: <bugtraq@...urityfocus.com>, <full-disclosure@...ts.netsys.com>,
<NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM>, <vulnwatch@...nwatch.org>
Subject: Zone Labs Security Advisory ZL04-08 - SMTP processing vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Zone Labs Security Advisory ZL04-008
Zone Labs SMTP Processing Vulnerability
Date Published February 18, 2004
Date Last Revised February 18, 2004
Severity Medium
Overview
========
A security vulnerability exists in specific versions of ZoneAlarm,
ZoneAlarm Pro, ZoneAlarm Plus and the Zone Labs Integrity client.
This vulnerability is caused by an unchecked buffer in Simple Mail
Transfer Protocol (SMTP) processing which could lead to a buffer
overflow. In order to exploit the vulnerability without user
assistance, the target system must be operating as an SMTP server.
Zone Labs does not recommend using our client security products to
protect servers.
Upgrading an affected Zone Labs product will remove this
vulnerability.
Impact
======
If successfully exploited, a skilled attacker could cause the
firewall to stop processing traffic, execute arbitrary code, or
elevate malicious code's privileges.
Zone Labs recommends affected users update their software to the
current versions which address the issue.
Affected Products
* ZoneAlarm family of products and Integrity client versions
4.0 and above
Unaffected Products
* ZoneAlarm and Integrity client versions earlier than 4.0
Integrity Server and Integrity Clientless Security products are not
affected.
Description
===========
Zone Labs desktop security products process SMTP in order to perform
various security functions. Due to an unchecked buffer in the SMTP
processing system, a skilled attacker could cause the firewall to
stop processing traffic or execute arbitrary code.
Successful exploitation requires one of the following scenarios and
applies only to SMTP traffic:
* A program listening on port 25/TCP (SMTP) of the target system.
This condition is usually only present on SMTP servers.
Zone Labs does not recommend using our client security products
to protect servers.
* A malicious program running on the protected system could
trigger the buffer overflow and gain SYSTEM privileges if the
user or administrator has given it permission to access the
network.
In all cases, the program requesting network access must be approved
by the user through the Program Control policy.
Recommended Actions
===================
ZoneAlarm, ZoneAlarm Plus, and ZoneAlarm Pro users should upgrade to
version: 4.5.538.001
To update your Zone Labs client product:
1. Select Overview | Preferences.
2. In the Check for Updates area, choose an update option.
Automatically: Zone Labs security software automatically notifies
you when an update is available.
Manually: You monitor the Status tab for updates. To invoke an
update check immediately, click Check for Update.
Integrity 4.0 users should upgrade to Integrity client version:
4.0.146.046
Integrity 4.5 users should upgrade to Integrity client version:
4.5.085
Integrity updates are available on the Zone Labs Enterprise Support
web site.
Related Resources
=================
* Zone Labs Security Services:
http://www.zonelabs.com/store/content/support/securityUpdate.jsp
Acknowledgments
===============
Zone Labs would like to acknowledge eEye Digital Security for
reporting this issue to Zone Labs.
Contact
=======
Zone Labs customers who are concerned about this vulnerabilities or
have additional technical questions may reach our Technical Support
group at: http://www.zonelabs.com/support/
To report security issues with Zone Labs products contact:
security@...elabs.com
Disclaimer
==========
The information in the advisory is believed to be accurate at the
time of publishing based on currently available information. Use of
the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information. Zone Labs and Zone Labs products, are
registered trademarks of Zone Labs Incorporated and/or affiliated
companies in the United States and other countries. All other
registered and unregistered trademarks represented in this document
are the sole property of their respective companies/owners.
Copyright
=========
2004 Zone Labs, Inc. All rights reserved. Zone Labs, TrueVector,
ZoneAlarm, and Cooperative Enforcement are registered trademarks of
Zone Labs, Inc. The Zone Labs logo, Zone Labs Integrity and IMsecure
are trademarks of Zone Labs, Inc. Zone Labs Integrity protected under
U.S. Patent No. 5,987,611. Reg. U.S. Pat. & TM Off. Cooperative
Enforcement is a service mark of Zone Labs, Inc. All other trademarks
are the property of their respective owners.
Permission to redistribute this alert electronically is granted as
long as it is not edited in any way unless authorized by Zone Labs.
Reprinting the whole or part of this alert in any medium other than
electronically requires permission from Zone Labs.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2
iQA/AwUBQDQEQFDxXw2Is3mLEQLU8gCggqFKIurmeuyl6JQVslFXeP7QFxAAnRnt
jDZGXRzVYVe4glFzXf80lSx/
=3tRs
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists