Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2001-07/0128.html - Patch, Vendor Advisory | |
References | () http://ciac.llnl.gov/ciac/bulletins/l-109.shtml - | |
References | () http://online.securityfocus.com/cgi-bin/archive.pl?id=1&start=2002-03-11&end=2002-03-17&mid=195647&threads=1 - | |
References | () http://www.cert.org/advisories/CA-2001-17.html - US Government Resource | |
References | () http://www.checkpoint.com/techsupport/alerts/rdp.html - | |
References | () http://www.kb.cert.org/vuls/id/310295 - US Government Resource | |
References | () http://www.osvdb.org/1884 - | |
References | () http://www.securityfocus.com/bid/2952 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6815 - |
Information
Published : 2001-07-09 04:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1158
Mitre link : CVE-2001-1158
CVE.ORG link : CVE-2001-1158
JSON object : View
Products Affected
checkpoint
- firewall-1
CWE