Hi all,
While this Vulnerability [1] is now widely known for 3 weeks, I haven't
found much on this topic on this list, cpshared.com (except my post) or
cpug.
Thats why I wanted to raise attention to the Security HotFix [2,3] for
your IDA/NAC/DLP/UserCheck Portal and MobileAccess/SSL-VPN enabled
R71/R75 Security Gateway.
If you didn't install the HotFix already, you should schedule
installation soon. Otherwise it could be pretty easy for an attacker to
provoke a DoS of your Security Gateway by generating Hash Collisions
thorugh specially crafted HTTP POST Requests to the "Web Portal".
Note: This is only possible if the attacker has access to the Portal,
however unauthenticated access is enough (no Logon to the Portal required).
In short: Patch your Gateways. :)
Links:
[1] Vulnerability Note VU#903934: http://www.kb.cert.org/vuls/id/903934
[2] Check Point SK:
http://supportcontent.checkpoint.com/solutions?id=sk66350
[3] Check Point Hotfix:
http://supportcontent.checkpoint.com/file_download?id=13554
Best regards,
Simon Kowallik
Scanned by Check Point Total Security Gateway.
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [email protected]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[email protected]
=================================================