ID

VAR-200112-0202


CVE

CVE-2001-1549


TITLE

Tiny Personal Firewall Outbound packet bypass vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200112-160

DESCRIPTION

Tiny Personal Firewall 1.0 and 2.0 allows local users to bypass filtering via non-standard TCP packets created with non-Windows protocol adapters. Many of these applications only block packets created by the standard Windows protocol adapter. Exploitation will result in a violation of security policy. Tiny Personal Firewall, ZoneAlarm and ZoneAlarm Pro are confirmed vulnerable. It is believed that other applications similar in design may also be vulnerable

Trust: 1.26

sources: NVD: CVE-2001-1549 // BID: 3647 // VULHUB: VHN-4350

AFFECTED PRODUCTS

vendor:tinymodel:personal firewallscope:eqversion:2.0

Trust: 1.9

vendor:tinymodel:personal firewallscope:eqversion:1.0

Trust: 1.9

vendor:zonemodel:labs zonealarm proscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarm proscope:eqversion:2.4

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.6

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.5

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.4

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.3

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.2

Trust: 0.3

vendor:zonemodel:labs zonealarmscope:eqversion:2.1

Trust: 0.3

sources: BID: 3647 // CNNVD: CNNVD-200112-160 // NVD: CVE-2001-1549

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-1549
value: LOW

Trust: 1.0

CNNVD: CNNVD-200112-160
value: LOW

Trust: 0.6

VULHUB: VHN-4350
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2001-1549
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4350
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-4350 // CNNVD: CNNVD-200112-160 // NVD: CVE-2001-1549

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-1549

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-200112-160

TYPE

Design Error

Trust: 0.9

sources: BID: 3647 // CNNVD: CNNVD-200112-160

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-4350

EXTERNAL IDS

db:BIDid:3647

Trust: 2.0

db:NVDid:CVE-2001-1549

Trust: 1.7

db:CNNVDid:CNNVD-200112-160

Trust: 0.7

db:XFid:7671

Trust: 0.6

db:BUGTRAQid:20011205 FLAWED OUTBOUND PACKET FILTERING IN VARIOUS PERSONAL FIREWALLS

Trust: 0.6

db:SEEBUGid:SSVID-75005

Trust: 0.1

db:EXPLOIT-DBid:21169

Trust: 0.1

db:VULHUBid:VHN-4350

Trust: 0.1

sources: VULHUB: VHN-4350 // BID: 3647 // CNNVD: CNNVD-200112-160 // NVD: CVE-2001-1549

REFERENCES

url:http://www.securityfocus.com/bid/3647

Trust: 1.7

url:http://archives.neohapsis.com/archives/bugtraq/2001-12/0056.html

Trust: 1.7

url:http://www.iss.net/security_center/static/7671.php

Trust: 1.7

url:http://www.hackbusters.net/ob.html

Trust: 0.3

url:http://www.tinysoftware.com/home/tiny?s=7741043568395572227a0&&pg=tpf_summary

Trust: 0.3

url:http://www.zonelabs.com

Trust: 0.3

sources: VULHUB: VHN-4350 // BID: 3647 // CNNVD: CNNVD-200112-160 // NVD: CVE-2001-1549

CREDITS

Discovered by Tom Liston <tliston@premmag.com>.

Trust: 0.9

sources: BID: 3647 // CNNVD: CNNVD-200112-160

SOURCES

db:VULHUBid:VHN-4350
db:BIDid:3647
db:CNNVDid:CNNVD-200112-160
db:NVDid:CVE-2001-1549

LAST UPDATE DATE

2025-04-03T22:25:21.857000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-4350date:2008-09-05T00:00:00
db:BIDid:3647date:2001-12-06T00:00:00
db:CNNVDid:CNNVD-200112-160date:2005-10-20T00:00:00
db:NVDid:CVE-2001-1549date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-4350date:2001-12-31T00:00:00
db:BIDid:3647date:2001-12-06T00:00:00
db:CNNVDid:CNNVD-200112-160date:2001-12-31T00:00:00
db:NVDid:CVE-2001-1549date:2001-12-31T05:00:00