Check Point FireWall-1 4.0 and 4.1 before SP5 allows remote attackers to obtain the IP addresses of internal interfaces via certain SecuRemote requests to TCP ports 256 or 264, which leaks the IP addresses in a reply packet.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2003-09/0018.html | Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2003-09/0018.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2003-09/0018.html - Vendor Advisory |
Information
Published : 2003-10-20 04:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0757
Mitre link : CVE-2003-0757
CVE.ORG link : CVE-2003-0757
JSON object : View
Products Affected
checkpoint
- firewall-1
CWE