First published: Tue Mar 14 2006(Updated: )
Untrusted search path vulnerability in the TrueVector service (VSMON.exe) in Zone Labs ZoneAlarm 6.x and Integrity does not search ZoneAlarm's own folders before other folders that are specified in a user's PATH, which might allow local users to execute code as SYSTEM by placing malicious DLLs into a folder that has insecure permissions, but is searched before ZoneAlarm's folder. NOTE: since this issue is dependent on the existence of a vulnerability in a separate product (weak permissions of executables or libraries, or the execution of malicious code), perhaps it should not be included in CVE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZoneAlarm by Check Point | =6.1.744.000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1221 is considered a high severity vulnerability due to its potential to allow local users to execute code with SYSTEM privileges.
To fix CVE-2006-1221, ensure that the TrueVector service is updated to a version that addresses this untrusted search path vulnerability.
CVE-2006-1221 affects users of Zone Labs ZoneAlarm version 6.1.744.000 and possibly earlier versions.
CVE-2006-1221 is classified as an untrusted search path vulnerability, which can lead to arbitrary code execution.
An attacker would need local access to the system to place malicious DLLs in a location that the TrueVector service checks.