Hi all,

While this Vulnerability [1] is now widely known for 3 weeks, I haven't found much on this topic on this list, cpshared.com (except my post) or cpug. Thats why I wanted to raise attention to the Security HotFix [2,3] for your IDA/NAC/DLP/UserCheck Portal and MobileAccess/SSL-VPN enabled R71/R75 Security Gateway.

If you didn't install the HotFix already, you should schedule installation soon. Otherwise it could be pretty easy for an attacker to provoke a DoS of your Security Gateway by generating Hash Collisions thorugh specially crafted HTTP POST Requests to the "Web Portal". Note: This is only possible if the attacker has access to the Portal, however unauthenticated access is enough (no Logon to the Portal required).


In short: Patch your Gateways. :)


Links:
[1] Vulnerability Note VU#903934: http://www.kb.cert.org/vuls/id/903934
[2] Check Point SK: http://supportcontent.checkpoint.com/solutions?id=sk66350 [3] Check Point Hotfix: http://supportcontent.checkpoint.com/file_download?id=13554


Best regards,
Simon Kowallik



Scanned by Check Point Total Security Gateway.

=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [email protected]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[email protected]
=================================================

Reply via email to