Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Security App Flaws :: fw-25~1.htm

VPN-1/FireWall-1 string format errors



Vulnerability

    VPN-1/FireWall-1

Affected

    VPN-1/FireWall-1 4.1

Description

    A security issue exists in VPN-1/FireWall-1 version 4.1 whereby  a
    valid  firewall  administrator   connecting  from  an   authorized
    management client may send malicious data to a management  station
    inside a control connection, possibly preventing proper  operation
    of  the  management  station.   This  issue  exists  because  some
    instances of improper string formatting occur in  VPN-1/FireWall-1
    version 4.1.   By sending  specially constructed  commands through
    authorized communication channels, arbitrary code may be  inserted
    onto the operating system  stack of a VPN-1/FireWall-1  management
    station.   This  vulnerability  may   only  be  exploited  by   an
    authorized   and   authenticated   VPN-1/FireWall-1  administrator
    connecting  from   a  workstation   explicitly  trusted   by   the
    management  station,   although  read/write   permission  is   not
    required  in  order  to  perform  this  attack.  Since full access
    (read/write) administrators and those at the local system  console
    already have  direct access  to the  firewall system,  this is  an
    escalation of privilege only for read-only administrators.

    All  installations  of  VPN-1/FireWall-1  which  allow  remote GUI
    connections  should  be  assumed  vulnerable  to this exploit.  It
    should  be  noted  again  that  the  attack  must  be  made  by an
    authorized  and  valid  VPN-1/FireWall-1  administrator connecting
    from an authorized GUI client station.

    This  issue  has  been  reported  to  Check Point by Halvar Flake,
    senior reverse engineer of BlackHat Consulting.

Solution

    Restrict remote GUI access for read/only firewall  administrators;
    review list of administrators and authorized GUI clients.

    For all users, upgrade to VPN-1/FireWall-1 4.1 Service Pack 4  and
    install the SP4 hotfix.  This  hotfix only needs to be applied  to
    management stations, not firewall modules.

    Check Point/Nokia Appliances (IPSO) and  AIX Note:  Since 4.1  SP3
    is the most recent version of VPN-1/FireWall-1 released for  these
    platforms, the  hotfix for  these will  be released  for 4.1  SP3.
    Future service packs will incorporate the fix.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH