Remote Compromise Vulnerability in Check Point VPN-1 Gateway

A buffer-overrun vulnerability can permit remote compromise of a Check Point VPN-1 gateway.

Ken Pfeil

July 31, 2004

1 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported July 28, 2004, by Internet Security Systems

VERSIONS AFFECTED

DESCRIPTION
A buffer-overrun vulnerability can permit remote compromise of a Check Point VPN-1 gateway. An Internet Security Association and Key Management Protocol (ISAKMP) problem affects Check Point VPN-1 products during negotiations of a VPN tunnel. When the VPN-1 server performs Abstract Syntax Notation One (ASN.1) decoding, an attacker can trigger an arbitrary-length heap overflow, which might result in complete compromise of the VPN-1 server. Through a single-packet attack, an unauthenticated remote attacker can trigger this vulnerability. If UDP-based Internet Key Exchange (IKE) negotiation is enabled (aggressive mode), the attacker might be able to conceal the source of attacks and perform a blind-spoofed attack.
 

VENDOR RESPONSE
Check Point has released"ASN.1 Alert" to address this vulnerability and recommendsthat affected users immediately apply the appropriate patch listed in thebulletin.

CREDIT
Discovered by Internet Security Systems.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like