The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Fw: Firewall-1 remote SYSTEM shell buffer overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Fri, 30 Nov 2001 10:32:52 -0500
From: Scott Walker Register <[email protected]>
To: [email protected]
Subject: Fw: Firewall-1 remote SYSTEM shell buffer overflow



Check Point has investigated this issue and determined that this vulnerability has 
already been disclosed and corrected.  For further information, please refer to 
http://www.checkpoint.com/techsupport/alerts/buffer_overflow.html .  Note that this 
issue is also fixed in VPN-1/FW-1 version NG, Feature Pack 1.

-SwR

------------------------
>   From: Indigo <[email protected]>
>   Subject: Firewall-1 remote SYSTEM shell buffer overflow
>   Date: 28 Nov 2001 20:08:14 -0000 
>   To: [email protected]
> 
> 
> Mailer: SecurityFocus
> 
> As you can see I've got a few weeks free between 
> jobs to write some overflows!
> 
> Here's badboy.c the overflow for Checkpoint Firewall-1
> 
> NB The overflow only works if you launch the attack 
> from a valid GUI client machine i.e. your IP address 
> must be present in the target firewall's 
> $FWDIR/conf/gui-clients file.
> 

---------------End of Original Message-----------------

----------------------------------------------------------------
[email protected]  ||  FireWall-1 Product Manager
               Check Point Software Technologies, Inc.
2255 Glades Road    /    Suite 324A     \  Boca Raton, FL  33431
Voice: 561.989.5418 | Fax: 561.997.5421  |   11/30/01   10:32:52
----------------------------------------------------------------

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру