ISS X-Force has discovered two vulnerabilities in the recent version of Checkpoint firewall-1 and VPN-1 software named NG AI.
The first vulnerability is in the HTTP Security server that functions like a proxy. This flaw is also present in the proxy that ships with all version of Firewall-1. The affected components contain several remotely exploitable format string vulnerabilities. The second may be exploited by a remote attacker to remotely compromise any VPN-1 server and/or client system running SecureClient/SecureClient. X-Force has developed functional exploit code for this vulnerability and has demonstrated successful attacks using real-world scenarios. We have received those information early this morning and we are working on this issue. for the moment, we have prepared some information we have on http://www.tla.ch/TLA/NEWS/2004sec/20040205Checpoint-Http-parsing-vulnerabil ity.htm We are concerned by those vulnerabilities and would appreciate any feed back. TIA Christian ALT Telecom and Logistics Associates Network and Secuirty Company http://www.tla.ch Firewall-1 FAQ http://www.tla.ch/TLA/FW/FW1FAQ.html --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.576 / Virus Database: 365 - Release Date: 30.01.2004 ================================================= To set vacation, Out-Of-Office, or away messages, send an email to [EMAIL PROTECTED] in the BODY of the email add: set fw-1-mailinglist nomail ================================================= To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================= If you have any questions on how to change your subscription options, email [EMAIL PROTECTED] =================================================
