<<< Date Index >>>     <<< Thread Index >>>

Statement Regarding Reported Local Escalation of Privileges Vulnerability for ZoneAlarm



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Statement Regarding Reported Local Escalation of Privileges Vulnerability for 
ZoneAlarm
 
Severity: 
Low
 
Impact: 
Local escalation of privileges
 
Remotely exploitable:
No
 
Affected software: 
ZoneAlarm and its variations (6.x confirmed, other versions may be susceptible)
Integrity (specific versions affected not yet determined)
 
Description:
A local escalation of privileges issue in ZoneAlarm products does exist.
 
The TrueVector service (VSMON.exe), which runs under the local SYSTEM account, 
loads several DLLs (Dynamically Linked Libraries) as part of its startup 
process - which by default happens 
automatically when a user starts Windows. 
In some cases, DLLs may not be present in a given installation but will be 
searched for anyway. 
If a DLL matching one of those names appears in the set of directories 
searched, 
it may be loaded with the same privileges as the TrueVector service (SYSTEM 
level account). 
Internal testing of the issue is still ongoing, and additional symptoms may be 
undiscovered at this stage.
   
How an attacker may exploit this:
An attacker who succeeds placing a malicious DLL in a folder, which appears in 
the PATH before the ZoneAlarm folder, 
might run the malicious DLL under the SYSTEM local account privileges. 
Any software program that runs with SYSTEM privileges and dynamically loads 
DLLs from the PATH 
could be subjected to a similar issue. 
 
Mitigating factors:
An attacker must first place, or convince the user to place, a malicious DLL in 
a folder 
that appears in the path before the ZoneAlarm folder. 
In order to accomplish this, the machine would already be compromised through 
another hacking method, 
either Trojan-like malware or through social engineering.
 
Patch Release:
This issue has been given a high priority and a fix is currently under 
development. 
As soon as it is finished and tested, it will be released through a special 
product update. 
 
We encourage security researchers and users to report security related issues 
to security@xxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32) - WinPT 0.11.8

iD8DBQFEELoCUPFfDYizeYsRAo4xAJ9h5TvAo398UE8B8CQJYFwL8K16pwCeKE1I
Rx18vVgdWbGMh+KXxE1OIqQ=
=EaU6
-----END PGP SIGNATURE-----