Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

Check Point FireWall-1 has multiple critical vulnerabilities

Feb 25, 2004 12:37PM PST

News.com reports that Check Point has provided a patch for its Next Generation (NG) series, but only about 70 percent of current users have installed the version that will be patched. VPN-1 is no longer supported and won't be patched.

One vulnerability is due to a flaw in the HTTP Security Server proxy that is included with all current versions of FireWall-1. Attackers could use this exploit to tamper with the firewall configuration, leading to complete compromise of the network.

A flaw in the ISAKMP processing for VPN-1 Server, SecuRemote and SecureClient can allow a remote attacker to penetrate any VPN-1 server or client running SecuRemote and SecureClient. The threats are caused by format string errors found only in the Application Intelligence component and the HTTP Security Server application proxy and occurs only during the parsing of HTTP traffic. Even an unsuccessful attack can apparently crash current sessions.

Risk level?High to critical
These vulnerabilities can allow a remote attacker to completely compromise the vital firewall protection and also run arbitrary code on the system.

Fix?Patch
Patches are available for:
Check Point FireWall-1 NG FP3 HF2
Check Point FireWall-1 NG with Application Intelligence R54
Check Point FireWall-1 NG with Application Intelligence R55

More info at http://techupdate.zdnet.com/techupdate/stories/main/Check_Point_FireWall-1.html?tag=tu.arch.link

Discussion is locked