CVE-2001-1158
https://notcve.org/view.php?id=CVE-2001-1158
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0128.html http://ciac.llnl.gov/ciac/bulletins/l-109.shtml http://online.securityfocus.com/cgi-bin/archive.pl?id=1&start=2002-03-11&end=2002-03-17&mid=195647&threads=1 http://www.cert.org/advisories/CA-2001-17.html http://www.checkpoint.com/techsupport/alerts/rdp.html http://www.kb.cert.org/vuls/id/310295 http://www.osvdb.org/1884 http://www.securityfocus.com/bid/2952 https://exchange.xforce.ibmcloud.com/ •
CVE-2001-0182
https://notcve.org/view.php?id=CVE-2001-0182
FireWall-1 4.1 with a limited-IP license allows remote attackers to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources. • http://archives.neohapsis.com/archives/bugtraq/2001-01/0298.html http://www.osvdb.org/1733 http://www.securityfocus.com/bid/2238 https://exchange.xforce.ibmcloud.com/vulnerabilities/5966 •
CVE-2001-0082 – Check Point Software Firewall-1 4.1 SP2 - Fast Mode TCP Fragment
https://notcve.org/view.php?id=CVE-2001-0082
Check Point VPN-1/FireWall-1 4.1 SP2 with Fastmode enabled allows remote attackers to bypass access restrictions via malformed, fragmented packets. • https://www.exploit-db.com/exploits/20519 http://archives.neohapsis.com/archives/bugtraq/2000-12/0271.html •
CVE-2000-1037 – Check Point Software Firewall-1 3.0/1 4.0/1 4.1 - Session Agent Dictionary Attack
https://notcve.org/view.php?id=CVE-2000-1037
Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack. • https://www.exploit-db.com/exploits/20215 https://www.exploit-db.com/exploits/20216 http://www.securityfocus.com/archive/1/76389 http://www.securityfocus.com/bid/1662 •
CVE-2000-0806
https://notcve.org/view.php?id=CVE-2000-0806
The inter-module authentication mechanism (fwa1) in Check Point VPN-1/FireWall-1 4.1 and earlier may allow remote attackers to conduct a denial of service, aka "Inter-module Communications Bypass." • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Inter-module_Communications http://www.osvdb.org/4413 https://exchange.xforce.ibmcloud.com/vulnerabilities/5162 •