[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8D8863BB65A02F47A303E5B7666126710152F44D@exmb1.zonelabs.com>
Date: Wed, 25 Aug 2004 13:02:01 -0700
From: "Zone Labs Product Security" <Product-Security@...elabs.com>
To: <bugtraq@...urityfocus.com>, <vuldb@...urityfocus.com>
Cc: "Zone Labs Security Team" <security@...elabs.com>
Subject: Check Point - Zone Labs Division - Response to "Weak Default Permissions Vulnerability"
Check Point - Zone Labs Division:
Response to "Weak Default Permissions Vulnerability"
Summary
Zone Labs ZoneAlarm family of products and Check Point
Integrity endpoint security client software use the
folder "%WINDOWS%\Internet Logs" to store a copy of
logging information and the locally stored security
policy. Zone Labs security clients do NOT rely upon
NTFS file ownership and permissions to protect logging
and policy files stored in this folder. Key files
are protected by the security client itself. Logging
and policy information cannot be altered as the result
of weak file ownership or permissions.
Details
Zone Labs security clients write logging information
to an unprotected file named ZAlog*.txt as a convenient
way for the local user to observe recent events.
However, all logged events are also stored in another
file that is protected.
ZoneAlarm product family users may review the contents
of the protected log file with the client user interface.
Integrity server collects security client logs from the
protected log files at regular intervals. Administrators
may review the logged information via the Integrity
Administration console.
Zone Labs, a Check Point Company, regards the security
of our products and services very seriously and responds
to all reports of security matters as soon as possible.
To contact the Zone Labs product security team, please
contact security@...elabs.com.
Powered by blists - more mailing lists