Overview
Several versions of Check Point Firewall-1 contain a vulnerability that allows remote attackers to execute arbitrary code with administrative privileges.
Description
The HTTP Security Servers component of Check Point Firewall-1 contains an HTTP parsing vulnerability that is triggered by sending an invalid HTTP request through the firewall. When Firewall-1 generates an error message in response to the invalid request, a portion of the input supplied by the attacker is included in the format string for a call to sprintf(). Researchers at Internet Security Systems have determined that it is possible to exploit this format string vulnerability to execute commands on the firewall. The researchers have also determined that this vulnerability can be exploited as a heap overflow, which would allow an attacker to execute arbitrary code. In either case, the commands or code executed by the attacker would run with administrative privileges, typically "SYSTEM" or "root". For more information, please see the ISS advisory. |
Impact
This vulnerability allows remote attackers to execute arbitrary code on affected firewalls with administrative privileges, typically "SYSTEM" or "root". |
Solution
Apply the patch from Check Point |
Disable the affected components
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was discovered and researched by Mark Dowd of ISS X-Force.
This document was written by Jeffrey P. Lanza.
Other Information
CVE IDs: | CVE-2004-0039 |
Severity Metric: | 17.10 |
Date Public: | 2004-02-04 |
Date First Published: | 2004-02-05 |
Date Last Updated: | 2004-04-23 14:45 UTC |
Document Revision: | 30 |