CVE-2000-0779
https://notcve.org/view.php?id=CVE-2000-0779
Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote attackers to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests. • http://www.checkpoint.com/techsupport/alerts/list_vun.html#Improper_stderr http://www.osvdb.org/1487 http://www.securityfocus.com/bid/1534 •
CVE-2000-0582 – Check Point Software Firewall-1 4.0/1.4.1 - Resource Exhaustion (Denial of Service)
https://notcve.org/view.php?id=CVE-2000-0582
Check Point FireWall-1 4.0 and 4.1 allows remote attackers to cause a denial of service by sending a stream of invalid commands (such as binary zeros) to the SMTP Security Server proxy. • https://www.exploit-db.com/exploits/20049 http://www.checkpoint.com/techsupport/alerts/list_vun.html#SMTP_Security http://www.osvdb.org/1438 http://www.securityfocus.com/bid/1416 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000630162106.4619C-100000%40fjord.fscinternet.com •
CVE-2000-0482 – Check Point Software Firewall-1 4.0/1 4.1 - Fragmented Packets Denial of Service
https://notcve.org/view.php?id=CVE-2000-0482
Check Point Firewall-1 allows remote attackers to cause a denial of service by sending a large number of malformed fragmented IP packets. • https://www.exploit-db.com/exploits/19994 http://archives.neohapsis.com/archives/bugtraq/2000-05/0473.html http://www.checkpoint.com/techsupport/alerts/list_vun.html#IP_Fragmentation http://www.osvdb.org/1379 http://www.securityfocus.com/bid/1312 https://exchange.xforce.ibmcloud.com/vulnerabilities/4609 •
CVE-2000-0181
https://notcve.org/view.php?id=CVE-2000-0181
Firewall-1 3.0 and 4.0 leaks packets with private IP address information, which could allow remote attackers to determine the real IP address of the host that is making the connection. • http://archives.neohapsis.com/archives/bugtraq/2000-03/0119.html http://www.osvdb.org/1256 http://www.securityfocus.com/bid/1054 •
CVE-2000-0150
https://notcve.org/view.php?id=CVE-2000-0150
Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt. • http://www.kb.cert.org/vuls/id/328867 http://www.osvdb.org/4417 http://www.securityfocus.com/bid/979 •