First published: Wed Nov 16 2005(Updated: )
Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zonelabs ZoneAlarm | =6.0 | |
Zonelabs ZoneAlarm | =6.0 | |
ZoneAlarm Anti-Spyware by Zone Labs | =6.0 | |
ZoneAlarm Anti-Spyware by Zone Labs | =6.1 | |
Zonelabs ZoneAlarm Antivirus | =6.0 | |
ZoneAlarm Security Suite | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3560 is classified as a medium severity vulnerability.
To fix CVE-2005-3560, users should update their ZoneAlarm software to the latest version that addresses the vulnerability.
CVE-2005-3560 affects ZoneAlarm Pro 6.0, ZoneAlarm Internet Security Suite 6.0, ZoneAlarm Anti-Virus 6.0, ZoneAlarm Anti-Spyware 6.0 through 6.1, and ZoneAlarm 6.0.
CVE-2005-3560 can be exploited by remote attackers through URLs in HTML Modal Dialogs.
Yes, successful exploitation of CVE-2005-3560 allows attackers to bypass critical security features of ZoneAlarm.