3rd Apr 2002 [SBWID-5230]
COMMAND
vulnerability allowing bypass of ZoneAlarm\'s e-mail protection system
MailSafe
SYSTEMS AFFECTED
ZoneAlarm 3.0 MailSafe
PROBLEM
Edvice Security Services [http://www.edvicesecurity.com/] found
following regarding MailSafe, email protection module for ZoneAlarm, a
personal firewall.
It is possible to bypass ZoneAlarm Email Protection by appending a dot
to the file name extension (e.g. malicious.exe becomes malicious.exe.).
The dot changes the file name extension and MailSafe fails to compare
it with known dangerous extensions. The MS-Windows operating system on
the other hand disregards a dot at the end of a file name. When Windows
is given a file name ending with a dot, it will automatically remove
the dot from the file name extension. When Outlook or Outlook Express
receives a file name that ends with a dot, it will present the dot, but
will launch the appropriate application when the file is
double-clicked, as if the dot does not exist.
SOLUTION
Fix v3.0.118 is available from ZoneLabs [http://www.zonelabs.com/]
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH