Bugtraq mailing list archives

Various Vulnerabilities in ZoneAlarm MailSafe


From: "Edvice Security Services" <support () edvicesecurity com>
Date: Tue, 2 Apr 2002 10:33:13 +0200

Tuesday April 2, 2002

Various Vulnerabilities in ZoneAlarm MailSafe
*****************************************************
 
Scope
-----------
Edvice recently tested ZoneLabs ZoneAlarm Pro ability to detect and
quarantine incoming e-mail attachments that may contain malicious code
or viruses. This functionality is provided by ZoneAlarm's MailSafe
feature.
 
The Findings
--------------------
We encountered several vulnerabilities in ZoneAlarm 3.0 MailSafe. The
vulnerabilities allow bypassing ZoneAlarm's e-mail protection.
 
Details
--------------
Most of the vulnerabilities we encountered are known Email Filters
attack techniques and there is no point in explaining them again.
However, there is one issue worth mentioning:
 
It is possible to bypass ZoneAlarm Email Protection by appending a dot
to the file name extension (e.g. malicious.exe becomes malicious.exe.).
The dot changes the file name extension and MailSafe fails to compare it
with known dangerous extensions. The MS-Windows operating system on the
other hand disregards a dot at the end of a file name. When Windows is
given a file name ending with a dot, it will automatically remove the
dot from the file name extension. When Outlook or Outlook Express
receives a file name that ends with a dot, it will present the dot, but
will launch the appropriate application when the file is double-clicked,
as if the dot does not exist.
 
Vendor Status
----------------------
ZoneLabs was first contacted on January 26, 2002.
A fix (v3.0.118) for most of the vulnerabilities we encountered,
including the one mentioned above, is available through ZoneAlarm's
Check for Update feature as from yesterday. ZoneLabs is still working on
one of the vulnerabilities and a fix is expected soon.

HTML Version: http://www.edvicesecurity.com/ad02-02.htm


Current thread: