First published: Fri Feb 11 2005(Updated: )
vsdatant.sys in Zone Lab ZoneAlarm before 5.5.062.011, ZoneAlarm Wireless before 5.5.080.000, Check Point Integrity Client 4.x before 4.5.122.000 and 5.x before 5.1.556.166 do not properly verify that the ServerPortName argument to the NtConnectPort function is a valid memory address, which allows local users to cause a denial of service (system crash) when ZoneAlarm attempts to dereference an invalid pointer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zonelabs ZoneAlarm | =5.5.062.011 | |
Checkpoint Check Point Integrity Client | =4.5.122.000 | |
Checkpoint Check Point Integrity Client | <=5.1.556.166 | |
Zonelabs Zonealarm Wireless Security | <=5.5.080.000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0114 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2005-0114, update ZoneAlarm to version 5.5.062.011 or later and Check Point Integrity Client to version 4.5.122.000 or later.
CVE-2005-0114 affects Zone Labs ZoneAlarm versions before 5.5.062.011, ZoneAlarm Wireless versions before 5.5.080.000, and Check Point Integrity Client versions before 4.5.122.000 and 5.1.556.166.
CVE-2005-0114 can be exploited remotely without authentication, making systems vulnerable to attacks.
CVE-2005-0114 is a local privilege escalation vulnerability affecting the NtConnectPort function within the affected software.