CVE-2009-1227 – Check Point Firewall-1 - PKI Web Service HTTP Header Remote Overflow
https://notcve.org/view.php?id=CVE-2009-1227
NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service in Check Point Firewall-1 PKI Web Service allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) Authorization or (2) Referer HTTP header to TCP port 18624. NOTE: the vendor has disputed this issue, stating "Check Point Security Alert Team has analyzed this report. We've tried to reproduce the attack on all VPN-1 versions from NG FP2 and above with and without HFAs. The issue was not reproduced. • https://www.exploit-db.com/exploits/8313 http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0463.html http://www.securityfocus.com/archive/1/502256/100/0/threaded http://www.securityfocus.com/bid/34286 http://www.securitytracker.com/id?1021948 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-5994
https://notcve.org/view.php?id=CVE-2008-5994
Cross-site scripting (XSS) vulnerability in index.php in Check Point Connectra NGX R62 HFA_01 allows remote attackers to inject arbitrary web script or HTML via the dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en index.php de Check Point Connectra NGX R62 HFA_01, permite a atacantes remotos inyectar secuencias de comandos Web o HTML de su elección a través del parámetro dir. NOTA: información de origen desconocido; los detalles se han obtenido únicamente de fuentes de terceros. • http://secunia.com/advisories/31553 http://www.securityfocus.com/bid/31369 https://exchange.xforce.ibmcloud.com/vulnerabilities/45385 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-5849
https://notcve.org/view.php?id=CVE-2008-5849
Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264. Check Point VPN-1 R55, R65, y otras versiones, cuando la traducción de direcciones de puerto (PAT) es utilizada, permite a atacantes remotos conocer las direcciones IP de la intranet a través de un paquete con un pequeño TTL, que lanza una respuesta ICMP_TIMXCEED_INTRANS (también conocido como ICMP time exceeded in-transit)que contiene un paquete IP encapsulado con una dirección de intranet, como lo demuestra un paquete TCP al servidor de gestión del cortafuegos en el puerto 18264. • http://secunia.com/advisories/32728 http://www.portcullis-security.com/293.php http://www.securityfocus.com/bid/32306 http://www.vupen.com/english/advisories/2008/3229 https://exchange.xforce.ibmcloud.com/vulnerabilities/46645 https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk36321 https://svn.wald.intevation.org/svn/openvas/trunk/openvas-plugins/scripts/checkpoint-vpn1-pat-information-disclosure.nasl • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2008-1397
https://notcve.org/view.php?id=CVE-2008-1397
Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint. Check Point VPN-1 Power/UTM, con NGX R60 hasta R65 y el software NG AI R55, permite a usuarios remotos autenticados provocar una denegación de servicio (parada del túnel VPN sitio a sitio), y posiblemente interceptar tráfico de red, por la configuración de la dirección IP local RFC1918 al ser la misma que una de estas direcciones IP RFC1918 del punto final del túnel, y utilizando SecuRemote para conectar a una interfaz de red en el otro punto final. • http://puresecurity.com.au/index.php?action=fullnews&id=5 http://secunia.com/advisories/29394 http://www.kb.cert.org/vuls/id/992585 http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf http://www.securityfocus.com/bid/28299 http://www.securitytracker.com/id?1019666 http://www.vupen.com/english/advisories/2008/0953/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41260 https://supportcenter.checkpoint.com/supportcenter/portal • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-1208 – Check Point VPN-1 UTM Edge NGX 7.0.48x - Login Page Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2008-1208
Cross-site scripting (XSS) vulnerability in the login page in Check Point VPN-1 UTM Edge W Embedded NGX 7.0.48x allows remote attackers to inject arbitrary web script or HTML via the user parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la página de entrada de usuarios de Check Point VPN-1 UTM Edge W Embedded NGX 7.0.48x permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través del parámentro useCheck Point VPN-1 UTM r (usuario). • https://www.exploit-db.com/exploits/31340 http://secunia.com/advisories/29243 http://www.louhi.fi/advisory/checkpoint_080306.txt http://www.securityfocus.com/archive/1/489203/100/0/threaded http://www.securityfocus.com/bid/28116 http://www.securitytracker.com/id?1019554 http://www.vupen.com/english/advisories/2008/0788 https://exchange.xforce.ibmcloud.com/vulnerabilities/41032 https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk34520 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •