Fw: Firewall-1 remote SYSTEM shell buffer overflow

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





Check Point has investigated this issue and determined that this vulnerability has 
already been disclosed and corrected.  For further information, please refer to 
http://www.checkpoint.com/techsupport/alerts/buffer_overflow.html .  Note that this 
issue is also fixed in VPN-1/FW-1 version NG, Feature Pack 1.

-SwR

------------------------
>   From: Indigo <indig0@talk21.com>
>   Subject: Firewall-1 remote SYSTEM shell buffer overflow
>   Date: 28 Nov 2001 20:08:14 -0000 
>   To: bugtraq@securityfocus.com
> 
> 
> Mailer: SecurityFocus
> 
> As you can see I've got a few weeks free between 
> jobs to write some overflows!
> 
> Here's badboy.c the overflow for Checkpoint Firewall-1
> 
> NB The overflow only works if you launch the attack 
> from a valid GUI client machine i.e. your IP address 
> must be present in the target firewall's 
> $FWDIR/conf/gui-clients file.
> 

---------------End of Original Message-----------------

----------------------------------------------------------------
Scott.Register@us.CheckPoint.com  ||  FireWall-1 Product Manager
               Check Point Software Technologies, Inc.
2255 Glades Road    /    Suite 324A     \  Boca Raton, FL  33431
Voice: 561.989.5418 | Fax: 561.997.5421  |   11/30/01   10:32:52
----------------------------------------------------------------


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux