Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Firewall\-1
(Checkpoint)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 43 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2001-09-08 | CVE-2001-1102 | Check Point FireWall-1 3.0b through 4.1 for Solaris allows local users to overwrite arbitrary files via a symlink attack on temporary policy files that end in a .cpp extension, which are set world-writable. | Firewall\-1 | N/A | ||
2001-09-08 | CVE-2001-1101 | The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack. | Firewall\-1 | N/A | ||
2001-09-21 | CVE-2001-0940 | Buffer overflow in the GUI authentication code of Check Point VPN-1/FireWall-1 Management Server 4.0 and 4.1 allows remote attackers to execute arbitrary code via a long user name. | Firewall\-1 | N/A | ||
2001-03-26 | CVE-2001-0182 | FireWall-1 4.1 with a limited-IP license allows remote attackers to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources. | Firewall\-1 | N/A | ||
2001-02-12 | CVE-2001-0082 | Check Point VPN-1/FireWall-1 4.1 SP2 with Fastmode enabled allows remote attackers to bypass access restrictions via malformed, fragmented packets. | Firewall\-1 | N/A | ||
2001-08-31 | CVE-2000-1201 | Check Point FireWall-1 allows remote attackers to cause a denial of service (high CPU) via a flood of packets to port 264. | Firewall\-1 | N/A | ||
2000-12-11 | CVE-2000-1037 | Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. | Firewall\-1 | N/A | ||
2000-12-11 | CVE-2000-1032 | The client authentication interface for Check Point Firewall-1 4.0 and earlier generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to identify valid usernames on the firewall. | Firewall\-1 | N/A | ||
2000-11-14 | CVE-2000-0813 | Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to redirect FTP connections to other servers ("FTP Bounce") via invalid FTP commands that are processed improperly by FireWall-1, aka "FTP Connection Enforcement Bypass." | Firewall\-1 | N/A | ||
2000-11-14 | CVE-2000-0809 | Buffer overflow in Getkey in the protocol checker in the inter-module communication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to cause a denial of service. | Firewall\-1 | N/A |