123   2  /  3  页   跳转

已删除

没我想像的那么严重

我用ZA6.0,试了一下那个工具,这个工具只是演示而已,通过IE把信息发给目标网站,而通常IE是ZA允许访问网络的程序,而我运行了一下,结果既没有打开新的网页,za也没有提示。

所以,好像……貌似……应该吧,没什么事
gototop
 

哦 了解了 
我正在瑞星和ZA之间选择啊, 谢谢老大的解释。
现在我肯定选择瑞星了,支持楼主发的规则包!!!

最后问一下楼主:
我用的是中天版的瑞星防火墙,能用楼主大人发的规则包吗?
gototop
 

盗版 不能用
gototop
 

受影响系统:
Zone Labs ZoneAlarm Pro 5.1
Zone Labs ZoneAlarm Security Suite 5.5

描述:

  ZoneAlarm是一款流行的桌面防火墙系统。

  ZoneAlarm Pro中存在高级程序控制设置绕过漏洞。恶意程序可以使用DDE-IPC(Direct Data Exchange - Interprocess Communications)绕过桌面防火墙,这可能允许攻击者同不可信任的程序通讯,或通过其他可信任的程序(如Internet Explorer)访问Internet。

  厂商补丁:

  Zone Labs

  目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://www.zonelabs.com

gototop
 

简直胡说八道的.你再好好看看原文,原文最后一句是:ZA PRO5.5以上正式版用户,有"程序控制"功能,不受上述恶意代码影响.
gototop
 

你那个利用工具下载地址http://220.189.233.99/download/051008zabypass.ra
还没有到我桌面上,就被咖啡灭掉了.
gototop
 

楼上说话缓和点哦,楼主可是版主哦
gototop
 

呵呵,谁给个NPF 2005 中文下载地址哦,繁体的也可以啊
gototop
 

引用:
【wasjb的贴子】简直胡说八道的.你再好好看看原文,原文最后一句是:ZA PRO5.5以上正式版用户,有"程序控制"功能,不受上述恶意代码影响.
...........................

5.5以上的版本有个溢出漏洞
要做一样做
还有 出了这样天大的事情 这么NB 的工具
要是咖啡 不杀这个工具 咖啡可以关门了
gototop
 

补充一下 该漏洞的原文
Hi All !!

While I was testing desktop based firewalls (here it is Zone Alarm Pro) with
the firewall evasion kit developed by me, I found that a very old flaw still
exists in many latest versions of desktop based firewalls. It is possible
for a malicious program to bypass a desktop based firewall by using DDE-IPC
(Direct Data Exchange - Interprocess Communications) which enables an
un-trusted program to communicate with the attacker or access internet via
other trusted programs (Ex: Internet Explorer). This flaw is known since
before year 2003.

As per a post by Te Smith (Sr. Director, Corporate Communications, Zone
Labs), this issue is resolved in higher version Zone Alarm Pro having
Advanced Program Control feature. (Ref #
http://seclists.org/lists/bugtraq/2003/Jul/0000.html) However, I find that
this issue still exists in higher versions of Zone Alarm Pro and might also
exist in other desktop based firewalls.

I didn't find any good PoC around, so I thought of writing a PoC which can
demonstrate and explain how an un-trusted program can access internet or
establish connection with the attacker via other trusted programs by
leveraging over the DDE-IPC design flaw.

The PoC can be downloaded from the following link:
http://hackingspirits.com/vuln-rnd/vuln-rnd.html


gototop
 
123   2  /  3  页   跳转
页面顶部
Powered by Discuz!NT