ISS X-Force has discovered two vulnerabilities in the recent version of
Checkpoint firewall-1 and VPN-1 software named NG AI.

The first vulnerability is in the HTTP Security server that functions like a
proxy. This flaw is also present in the proxy that ships with all version of
Firewall-1. The affected components contain several remotely exploitable
format string vulnerabilities.
The second may be exploited by a remote attacker to remotely compromise any
VPN-1 server and/or client system running SecureClient/SecureClient. X-Force
has developed functional exploit code for this vulnerability and has
demonstrated successful attacks using real-world scenarios.

We have received those information early this morning and we are working on
this issue. for the moment, we have prepared some information we have on

http://www.tla.ch/TLA/NEWS/2004sec/20040205Checpoint-Http-parsing-vulnerabil
ity.htm

We are concerned by those vulnerabilities and would appreciate any feed
back.

TIA


Christian ALT

Telecom and Logistics Associates
Network and Secuirty Company
http://www.tla.ch

Firewall-1 FAQ http://www.tla.ch/TLA/FW/FW1FAQ.html
---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.576 / Virus Database: 365 - Release Date: 30.01.2004

=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================

Reply via email to