[14897] in bugtraq
Re: ZoneAlarm
daemon@ATHENA.MIT.EDU (Larz Sherer)
Mon May 15 04:43:57 2000
Message-Id: <20000512185018.8033.qmail@securityfocus.com>
Date: Fri, 12 May 2000 18:50:18 -0000
Reply-To: Larz Sherer <lsherer@ZONELABS.COM>
From: Larz Sherer <lsherer@ZONELABS.COM>
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <Enip.BSO.23.0004260220050.15969-100000@www.whitehats.com>
This is the company position on the Port 67 issue....
The port 67 vulnerability has been eliminated. The
upgraded version of ZoneAlarm contains the fix and is
available from http://www.zonelabs.com/download_ZA.htm
Previously, ZoneAlarm did not prevent TCP or UDP packets
from entering the computer through port 67. Port 67 was
deliberately left open to avoid instabilities encountered
on Windows NT machines using DHCP.
We felt confident that this did not compromise your
security or the security of our other users. ZoneAlarm, in
addition to its firewall capabilities, provides protection
against hackers through its unique application control
feature. Our product only allows applications the user
specifically approves to communicate via the Internet.
Even if a port appears to be open for traffic from the
outside, it is in fact closed to all unauthorized traffic.
Therefore port 67 could not (and cannot) be co-opted
unknowingly into communicating your private information to
a hacker via a Trojan horse. Our two measures of security
taken together provide the utmost protection for our
users.
Best regards
Zone Labs Support