ID CVE-2007-2174
Summary The IOCTL handling in srescan.sys in the ZoneAlarm Spyware Removal Engine (SRE) in Check Point ZoneAlarm before 5.0.156.0 allows local users to execute arbitrary code via certain IOCTL lrp parameter addresses.
References
Vulnerable Configurations
  • cpe:2.3:a:checkpoint:zonealarm:-:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:zonealarm:-:*:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:zonealarm:5.0.63.0:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:zonealarm:5.0.63.0:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 16-10-2018 - 16:42)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 23579
bugtraq 20070423 [Reversemode advisory] CheckPoint Zonelabs - ZoneAlarm SRESCAN driver local privilege escalation
idefense 20070420 Check Point Zone Labs SRESCAN IOCTL Local Privilege Escalation Vulnerability
sectrack
  • 1017948
  • 1017953
secunia 24986
vupen ADV-2007-1491
xf zonealarm-srescan-privilege-escalation(33786)
Last major update 16-10-2018 - 16:42
Published 24-04-2007 - 16:19
Last modified 16-10-2018 - 16:42
Back to Top