First published: Mon Dec 31 2001(Updated: )
ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zonelabs ZoneAlarm | =2.1 | |
Zonelabs ZoneAlarm | =2.4 | |
Zonelabs ZoneAlarm | =2.6 | |
Zonelabs ZoneAlarm | =2.4 | |
Zonelabs ZoneAlarm | =2.3 | |
Zonelabs ZoneAlarm | =2.6 | |
Zonelabs ZoneAlarm | =2.2 | |
Zonelabs ZoneAlarm | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.