Buffer Overrun Vulnerability in Checkpoint VPN-1

A buffer-overrun vulnerability in Check Point VPN products could let apotential attacker compromise a Check Point VPN-1 gateway.

Ken Pfeil

May 6, 2004

1 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported May 04, 2004, by Check Point

VERSIONS AFFECTED

DESCRIPTION
A buffer-overrun vulnerability in Check Point VPN products could let apotential attacker compromise a Check Point VPN-1 gateway. An Internet SecurityAssociation and Key Management Protocol (ISAKMP) vulnerability has beendiscovered that affects Check Point VPN-1 products during negotiations of a VPNtunnel. Check Point customers who don't use remote access VPNs orgateway-to-gateway VPNs or who've upgraded to current product versions (i.e.,VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410, and NG FP3 HFA-325; and VPN-1SecuRemote/SecureClient R56) aren't affected by this vulnerability.

VENDOR RESPONSE
Check Point hasreleased the bulletin"ISAKMP Vulnerability" to address this vulnerability and recommendsthat affected users immediately apply the appropriate patch listed in thebulletin.

CREDIT
Discovered by Check Point.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like