First published: Mon Dec 31 2001(Updated: )
ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zonelabs ZoneAlarm | =2.1 | |
Zonelabs ZoneAlarm | =2.4 | |
Zonelabs ZoneAlarm | =2.6 | |
Zonelabs ZoneAlarm | =2.4 | |
Zonelabs ZoneAlarm | =2.3 | |
Zonelabs ZoneAlarm | =2.6 | |
Zonelabs ZoneAlarm | =2.2 | |
Zonelabs ZoneAlarm | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1548 is categorized as a high severity vulnerability due to its potential to allow local users to bypass security filtering.
To fix CVE-2001-1548, upgrade to a version of ZoneAlarm that is not affected, such as versions later than 2.6.
CVE-2001-1548 affects ZoneAlarm versions 2.1 through 2.6 and ZoneAlarm Pro versions 2.4 and 2.6.
Local users of the affected versions of ZoneAlarm are at risk of exploiting this vulnerability.
Exploitation of CVE-2001-1548 can allow attackers to send non-standard TCP packets that bypass the software's filtering capabilities.