First published: Wed Jun 30 2004(Updated: )
The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote attackers to bypass the mobile code filtering. NOTE: it has been disputed by the vendor that this behavior is required by the SSL specification.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zonelabs ZoneAlarm | =5.0.590.015 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0612 is considered to be a moderate severity vulnerability due to the potential for mobile code to bypass filtering within SSL sessions.
CVE-2004-0612 allows remote attackers to bypass mobile code filtering, which can lead to unauthorized code execution on affected systems.
Yes, CVE-2004-0612 specifically affects ZoneAlarm Pro version 5.0.590.015.
The recommended fix for CVE-2004-0612 is to update to a newer version of ZoneAlarm that addresses this vulnerability.
While you can continue using ZoneAlarm Pro 5.0.590.015, it is advised to implement updates or alternative measures to mitigate the risks associated with CVE-2004-0612.