CVE-2001-1102
https://notcve.org/view.php?id=CVE-2001-1102
Check Point FireWall-1 3.0b through 4.1 for Solaris allows local users to overwrite arbitrary files via a symlink attack on temporary policy files that end in a .cpp extension, which are set world-writable. • http://www.securityfocus.com/archive/1/212824 http://www.securityfocus.com/bid/3300 https://exchange.xforce.ibmcloud.com/vulnerabilities/7094 •
CVE-2000-1032
https://notcve.org/view.php?id=CVE-2000-1032
The client authentication interface for Check Point Firewall-1 4.0 and earlier generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to identify valid usernames on the firewall. • http://www.osvdb.org/1632 http://www.securityfocus.com/archive/1/142808 http://www.securityfocus.com/bid/1890 https://exchange.xforce.ibmcloud.com/vulnerabilities/5816 •
CVE-2000-1037 – Check Point Software Firewall-1 3.0/1 4.0/1 4.1 - Session Agent Dictionary Attack
https://notcve.org/view.php?id=CVE-2000-1037
Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. • https://www.exploit-db.com/exploits/20215 https://www.exploit-db.com/exploits/20216 http://www.securityfocus.com/archive/1/76389 http://www.securityfocus.com/bid/1662 •
CVE-2000-0806
https://notcve.org/view.php?id=CVE-2000-0806
The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka "Inter-module Communications Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Inter-module_Communications http://www.osvdb.org/4413 https://exchange.xforce.ibmcloud.com/vulnerabilities/5162 •
CVE-2000-0805
https://notcve.org/view.php?id=CVE-2000-0805
Check Point VPN-1/FireWall-1 4.1 and earlier improperly retransmits encapsulated FWS packets, even if they do not come from a valid FWZ client, aka "Retransmission of Encapsulated Packets." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Retransmission_of http://www.osvdb.org/4415 https://exchange.xforce.ibmcloud.com/vulnerabilities/5469 •