search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Check Point ISAKMP vulnerable to buffer overflow via Certificate Request

Vulnerability Note VU#873334

Original Release Date: 2004-02-05 | Last Revised: 2004-02-12

Overview

A buffer overflow vulnerability exists in the Internet Security Association and Key Management Protocol (ISAKMP) implementation used in Check Point VPN-1, SecuRemote, and SecureClient products. An unauthenticated, remote attacker could execute arbitrary code with the privileges of the ISAKMP process, typically root or SYSTEM.

Description

ISAKMP (RFC 2408) defines a framework for authentication, key management, and the negotiation of Security Associations (SAs). The Internet Key Exchange protocol (IKE, RFC 2049) operates within the framework of ISAKMP and uses parts of Oakley (RFC 2412) and SKEME to negotiate and provide cryptographic key exchange for ISAKMP SAs. ISAKMP/IKE is commonly used by IPSec-based virtual private networks (VPNs).

The ISAKMP implementation used in the Check Point VPN server (VPN-1) and clients (SecuRemote, SecureClient) does not adequately validate Certificate Request payloads. As a result, a specially crafted ISAKMP packet could overflow a static memory buffer, writing arbitrary data on the stack.

Impact

An attacker who is able to send a UDP packet to the ISAKMP service (500/udp) could execute arbitrary code with the privileges of the VPN process, typically root or SYSTEM. No authentication is required to exploit this vulnerability.

Solution

Upgrade
This issue is resolved in Firewall-1/VPN-1 versions NG FP2 (released in April 2002) and 4.1 SP6 (June 2002). For further information, please see the Check Point ISAKMP Alert.

Check Point workarounds

The Check Point ISAKMP Alert provides the following advice for customers who are unable to upgrade:

Customers using affected releases, who are not able to upgrade at this time, can confirm that they are not affected by running "fw checklic encryption" for a false return.

Customers using affected releases, who have a VPN encryption license should disable the VPN encryption and confirm that there are no Objects with ISAKMP checked.

Customers who are running an earlier version of VPN-1/FireWall-1 4.1 SP5a and prior, and cannot upgrade should contact Check Point Technical Services for assistance.
Block or Restrict Access

Block or restrict access to the ISAKMP service (500/udp) from untrusted networks such as the Internet. This will disable IKE and ISAKMP functionality (authentication, key exchange, SA negotiation) which is likely to disable most VPN services. Depending on service requirements, it may be possible to operate VPN connections without IKE/ISAKMP by using static SAs and pre-shared keys. Note also that in most cases it is trivial for an attacker to spoof the source of a UDP packet.

Vendor Information

873334
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Internet Security Systems (ISS).

This document was written by Art Manion.

Other Information

CVE IDs: CVE-2004-0040
Severity Metric: 5.20
Date Public: 2004-02-04
Date First Published: 2004-02-05
Date Last Updated: 2004-02-12 16:51 UTC
Document Revision: 35

Sponsored by CISA.