CERTA-2005-AVI-168

Vulnerability from certfr_avis - Published: 2005-05-26 - Updated: 2005-05-26

Une vulnérabilité affectant certains produits de Zone Labs permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire, d'effectuer un déni de service ou d'élever ses privilèges.

Description

Zone Labs propose des solutions logicielles de sécurité.

Certains produits Zone Labs sont touchés par une vulnérabilité affectant la bibliothèque de liaison dynamique (Dynamic Link Library) Vet Antivirus Engine VetE.dll.

Cette vulnérabilité de type débordement de mémoire permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire, d'effectuer un déni de service ou d'élever ses privilèges, au moyen de paquets malicieusement contruits basés sur des protocoles courants (SMTP, FTP, SMB etc.).

Solution

Effectuer la mise à jour des logiciels affectés au moyen de l'option Update Now.

None
Impacted products
Vendor Product Description
N/A N/A ZoneAlarm Antivirus 5.x ;
ESET Security ZoneAlarm Security Suite 5.x.
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ZoneAlarm Antivirus 5.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "ZoneAlarm Security Suite 5.x.",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nZone Labs propose des solutions logicielles de s\u00e9curit\u00e9.\n\nCertains produits Zone Labs sont touch\u00e9s par une vuln\u00e9rabilit\u00e9 affectant\nla biblioth\u00e8que de liaison dynamique (Dynamic Link Library) Vet\nAntivirus Engine VetE.dll.\n\nCette vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire permet \u00e0 un\nutilisateur distant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire,\nd\u0027effectuer un d\u00e9ni de service ou d\u0027\u00e9lever ses privil\u00e8ges, au moyen de\npaquets malicieusement contruits bas\u00e9s sur des protocoles courants\n(SMTP, FTP, SMB etc.).\n\n## Solution\n\nEffectuer la mise \u00e0 jour des logiciels affect\u00e9s au moyen de l\u0027option\nUpdate Now.\n",
  "cves": [],
  "initial_release_date": "2005-05-26T00:00:00",
  "last_revision_date": "2005-05-26T00:00:00",
  "links": [
    {
      "title": "Site Internet de l\u0027\u00e9diteur :",
      "url": "http://www.zonelabs.com"
    }
  ],
  "reference": "CERTA-2005-AVI-168",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-05-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 affectant certains produits de Zone Labs permet \u00e0 un\nutilisateur distant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire,\nd\u0027effectuer un d\u00e9ni de service ou d\u0027\u00e9lever ses privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Zone Labs",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Zone Labs du 24 mai 2005",
      "url": "http://www.securityfocus.com/archive/1/398921"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…