Statement Regarding Reported Local Escalation of Privileges Vulnerability for ZoneAlarm
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Statement Regarding Reported Local Escalation of Privileges Vulnerability for
ZoneAlarm
Severity:
Low
Impact:
Local escalation of privileges
Remotely exploitable:
No
Affected software:
ZoneAlarm and its variations (6.x confirmed, other versions may be susceptible)
Integrity (specific versions affected not yet determined)
Description:
A local escalation of privileges issue in ZoneAlarm products does exist.
The TrueVector service (VSMON.exe), which runs under the local SYSTEM account,
loads several DLLs (Dynamically Linked Libraries) as part of its startup
process - which by default happens
automatically when a user starts Windows.
In some cases, DLLs may not be present in a given installation but will be
searched for anyway.
If a DLL matching one of those names appears in the set of directories
searched,
it may be loaded with the same privileges as the TrueVector service (SYSTEM
level account).
Internal testing of the issue is still ongoing, and additional symptoms may be
undiscovered at this stage.
How an attacker may exploit this:
An attacker who succeeds placing a malicious DLL in a folder, which appears in
the PATH before the ZoneAlarm folder,
might run the malicious DLL under the SYSTEM local account privileges.
Any software program that runs with SYSTEM privileges and dynamically loads
DLLs from the PATH
could be subjected to a similar issue.
Mitigating factors:
An attacker must first place, or convince the user to place, a malicious DLL in
a folder
that appears in the path before the ZoneAlarm folder.
In order to accomplish this, the machine would already be compromised through
another hacking method,
either Trojan-like malware or through social engineering.
Patch Release:
This issue has been given a high priority and a fix is currently under
development.
As soon as it is finished and tested, it will be released through a special
product update.
We encourage security researchers and users to report security related issues
to security@xxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32) - WinPT 0.11.8
iD8DBQFEELoCUPFfDYizeYsRAo4xAJ9h5TvAo398UE8B8CQJYFwL8K16pwCeKE1I
Rx18vVgdWbGMh+KXxE1OIqQ=
=EaU6
-----END PGP SIGNATURE-----