Vulnerability Description
ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zonelabs | Zonealarm | 2.1 |
References
- http://archives.neohapsis.com/archives/bugtraq/2001-12/0056.htmlExploitVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2001-12/0065.html
- http://www.iss.net/security_center/static/7671.php
- http://www.securityfocus.com/bid/3647Exploit
- http://archives.neohapsis.com/archives/bugtraq/2001-12/0056.htmlExploitVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2001-12/0065.html
- http://www.iss.net/security_center/static/7671.php
- http://www.securityfocus.com/bid/3647Exploit
FAQ
What is CVE-2001-1548?
CVE-2001-1548 is a vulnerability with a CVSS score of 2.1 (LOW). ZoneAlarm 2.1 through 2.6 and ZoneAlarm Pro 2.4 and 2.6 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters.
How severe is CVE-2001-1548?
CVE-2001-1548 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1548?
Check the references section above for vendor advisories and patch information. Affected products include: Zonelabs Zonealarm.