CERTA-2004-AVI-155

Vulnerability from certfr_avis - Published: 2004-05-05 - Updated: 2004-05-05

Une vulnérabilité a été découverte dans la mise en œuvre du protocole ISAKMP dans Checkpoint VPN-1.

Description

Le protocole ISAKMP (Internet Security Association and Key Management Protocol) est un protocole d'initialisation de communication utilisé par le protocole IPSEC. Une vulnérabilité est présente dans la mise en œuvre du protocole ISAKMP dans Checkpoint VPN-1 qui permet à un utilisateur mal intentionné d'exécuter du code arbitraire à distance lors de la négociation d'un tunnel VPN. Cette vulnérabilité n'affecte pas les utilisateurs n'utilisant pas de solution VPN ou ayant une version mise à jour pour VPN-1 Firewall-1 R55 HFA-03, R54 HFA-410, NG FP3 HFA-325 ou VPN-1 SecuRemote/SecureClient R56.

Solution

Appliquer le correctif suivant la version affectée (cf. Documentation).

None
Impacted products
Vendor Product Description
N/A N/A VPN-1/Firewall-1 VSX NG avec l'application Intelligence ;
N/A N/A VPN-1/Firewall-1 NG avec l'application Intelligence R54 HFA-410 ;
N/A N/A VPN-1/Firewall-1 NG avec l'application Intelligence R55 ;
N/A N/A VPN-1/Firewall-1 VSX ;
N/A N/A VPN-1 SecuRemote/SecureClient NG avec l'application Intelligence R56.
N/A N/A VPN-1/Firewall-1 NG FP3 HFA-325 ;
N/A N/A VPN-1/Firewall-1 GX ;
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VPN-1/Firewall-1 VSX NG avec l\u0027application Intelligence ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "VPN-1/Firewall-1 NG avec l\u0027application Intelligence R54 HFA-410 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "VPN-1/Firewall-1 NG avec l\u0027application Intelligence R55 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "VPN-1/Firewall-1 VSX ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "VPN-1 SecuRemote/SecureClient NG avec l\u0027application Intelligence R56.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "VPN-1/Firewall-1 NG FP3 HFA-325 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "VPN-1/Firewall-1 GX ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLe protocole ISAKMP (Internet Security Association and Key Management\nProtocol) est un protocole d\u0027initialisation de communication utilis\u00e9 par\nle protocole IPSEC. Une vuln\u00e9rabilit\u00e9 est pr\u00e9sente dans la mise en \u0153uvre\ndu protocole ISAKMP dans Checkpoint VPN-1 qui permet \u00e0 un utilisateur\nmal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance lors de la\nn\u00e9gociation d\u0027un tunnel VPN. Cette vuln\u00e9rabilit\u00e9 n\u0027affecte pas les\nutilisateurs n\u0027utilisant pas de solution VPN ou ayant une version mise \u00e0\njour pour VPN-1 Firewall-1 R55 HFA-03, R54 HFA-410, NG FP3 HFA-325 ou\nVPN-1 SecuRemote/SecureClient R56.\n\n## Solution\n\nAppliquer le correctif suivant la version affect\u00e9e (cf. Documentation).\n",
  "cves": [],
  "initial_release_date": "2004-05-05T00:00:00",
  "last_revision_date": "2004-05-05T00:00:00",
  "links": [
    {
      "title": "Alerte de s\u00e9curit\u00e9 Checkpoint du 04 Mai  2004 :",
      "url": "http://www.checkpoint.com/techsupport/alerts/ike_vpn.html"
    }
  ],
  "reference": "CERTA-2004-AVI-155",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-05-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans la mise en \u0153uvre du protocole\n`ISAKMP` dans Checkpoint VPN-1.\n",
  "title": "Vuln\u00e9rabilit\u00e9 ISAKMP dans Checkpoint VPN-1",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Alerte Checkpoint du 04 mai 2004",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…