Search criteria

6 vulnerabilities found for vpn-1_secureclient by checkpoint

FKIE_CVE-2008-0662

Vulnerability from fkie_nvd - Published: 2008-02-08 02:00 - Updated: 2025-04-09 00:30
Summary
The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials.
References
cve@mitre.orghttp://digihax.com/Not Applicable
cve@mitre.orghttp://secunia.com/advisories/28820Broken Link
cve@mitre.orghttp://securityreason.com/securityalert/3627Broken Link
cve@mitre.orghttp://www.securityfocus.com/archive/1/487735/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/27675Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id?1019317Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0475Permissions Required
cve@mitre.orghttps://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psmlNot Applicable
af854a3a-2127-422b-91ae-364da2661108http://digihax.com/Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28820Broken Link
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3627Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/487735/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27675Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019317Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0475Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psmlNot Applicable
Impacted products
Vendor Product Version
checkpoint vpn-1_secureclient ngai_r56
checkpoint vpn-1_secureclient ngx_r60

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1_secureclient:ngai_r56:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ED03425-BC02-49CA-A5A8-1C53CAE9BE89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1_secureclient:ngx_r60:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA98C3D-2AC0-41A7-BE14-F0C654D06CA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials."
    },
    {
      "lang": "es",
      "value": "La caracter\u00edstica Auto Local Logon en Check Point VPN-1 SecuRemote/SecureClient NGX R60 y R56 para las credenciales de cach\u00e9 de Windows bajo la clave de registro Checkpoint\\SecuRemote, que tiene permisos Everyone/Full Control, lo que permite a usuarios locales conseguir privilegios leyendo y reutilizando credenciales."
    }
  ],
  "id": "CVE-2008-0662",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2008-02-08T02:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://digihax.com/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/28820"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://securityreason.com/securityalert/3627"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/487735/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/27675"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1019317"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0475"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable"
      ],
      "url": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "http://digihax.com/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/28820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://securityreason.com/securityalert/3627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/487735/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/27675"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1019317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0475"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable"
      ],
      "url": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4093

Vulnerability from fkie_nvd - Published: 2005-12-08 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkpoint:secureclient_ng:*:*:fp1:*:*:*:*:*",
              "matchCriteriaId": "9CC5C407-EEB0-482A-822B-21F77E74F937",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:secureclient_ng:r56:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D6083C1-612E-4F2F-BB38-8F88C9B336C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1_secureclient:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE2E569B-4812-48EF-9E44-45D594147258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1_secureclient:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "90007E81-D5F9-4961-9DB1-C64977E74208",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint."
    }
  ],
  "id": "CVE-2005-4093",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-08T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17837"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23395"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015326"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15757"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.us.debian.org/security/2006/dsa-1237"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2808"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17837"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15757"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.us.debian.org/security/2006/dsa-1237"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2808"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-0662 (GCVE-0-2008-0662)

Vulnerability from cvelistv5 – Published: 2008-02-08 01:00 – Updated: 2024-08-07 07:54
VLAI?
Summary
The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/3627 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/bid/27675 vdb-entryx_refsource_BID
https://usercenter.checkpoint.com/usercenter/port… x_refsource_CONFIRM
http://secunia.com/advisories/28820 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/487735/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/0475 vdb-entryx_refsource_VUPEN
http://www.securitytracker.com/id?1019317 vdb-entryx_refsource_SECTRACK
http://digihax.com/ x_refsource_MISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:54:22.690Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3627"
          },
          {
            "name": "27675",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27675"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml"
          },
          {
            "name": "28820",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28820"
          },
          {
            "name": "20080207 Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487735/100/0/threaded"
          },
          {
            "name": "ADV-2008-0475",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0475"
          },
          {
            "name": "1019317",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019317"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://digihax.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3627"
        },
        {
          "name": "27675",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27675"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml"
        },
        {
          "name": "28820",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28820"
        },
        {
          "name": "20080207 Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487735/100/0/threaded"
        },
        {
          "name": "ADV-2008-0475",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0475"
        },
        {
          "name": "1019317",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019317"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://digihax.com/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0662",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3627",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3627"
            },
            {
              "name": "27675",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27675"
            },
            {
              "name": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml",
              "refsource": "CONFIRM",
              "url": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml"
            },
            {
              "name": "28820",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28820"
            },
            {
              "name": "20080207 Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487735/100/0/threaded"
            },
            {
              "name": "ADV-2008-0475",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0475"
            },
            {
              "name": "1019317",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019317"
            },
            {
              "name": "http://digihax.com/",
              "refsource": "MISC",
              "url": "http://digihax.com/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0662",
    "datePublished": "2008-02-08T01:00:00",
    "dateReserved": "2008-02-07T00:00:00",
    "dateUpdated": "2024-08-07T07:54:22.690Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4093 (GCVE-0-2005-4093)

Vulnerability from cvelistv5 – Published: 2005-12-08 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/15757 vdb-entryx_refsource_BID
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
http://www.mail-archive.com/swinog%40lists.swinog… x_refsource_MISC
http://www.us.debian.org/security/2006/dsa-1237 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/17837 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015326 vdb-entryx_refsource_SECTRACK
http://www.mail-archive.com/swinog%40lists.swinog… x_refsource_MISC
http://secunia.com/advisories/23395 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2808 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:31:49.184Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "15757",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15757"
          },
          {
            "name": "20051207 Checkpoint SecureClient NGX Security Policy can easily be disabled",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html"
          },
          {
            "name": "DSA-1237",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.us.debian.org/security/2006/dsa-1237"
          },
          {
            "name": "17837",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17837"
          },
          {
            "name": "1015326",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015326"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html"
          },
          {
            "name": "23395",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23395"
          },
          {
            "name": "ADV-2005-2808",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2808"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-12-12T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "15757",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15757"
        },
        {
          "name": "20051207 Checkpoint SecureClient NGX Security Policy can easily be disabled",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html"
        },
        {
          "name": "DSA-1237",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.us.debian.org/security/2006/dsa-1237"
        },
        {
          "name": "17837",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17837"
        },
        {
          "name": "1015326",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015326"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html"
        },
        {
          "name": "23395",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23395"
        },
        {
          "name": "ADV-2005-2808",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2808"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4093",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "15757",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15757"
            },
            {
              "name": "20051207 Checkpoint SecureClient NGX Security Policy can easily be disabled",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html"
            },
            {
              "name": "http://www.mail-archive.com/swinog@lists.swinog.ch/msg00799.html",
              "refsource": "MISC",
              "url": "http://www.mail-archive.com/swinog@lists.swinog.ch/msg00799.html"
            },
            {
              "name": "DSA-1237",
              "refsource": "DEBIAN",
              "url": "http://www.us.debian.org/security/2006/dsa-1237"
            },
            {
              "name": "17837",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17837"
            },
            {
              "name": "1015326",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015326"
            },
            {
              "name": "http://www.mail-archive.com/swinog@lists.swinog.ch/msg00798.html",
              "refsource": "MISC",
              "url": "http://www.mail-archive.com/swinog@lists.swinog.ch/msg00798.html"
            },
            {
              "name": "23395",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23395"
            },
            {
              "name": "ADV-2005-2808",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2808"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4093",
    "datePublished": "2005-12-08T11:00:00",
    "dateReserved": "2005-12-08T00:00:00",
    "dateUpdated": "2024-08-07T23:31:49.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0662 (GCVE-0-2008-0662)

Vulnerability from nvd – Published: 2008-02-08 01:00 – Updated: 2024-08-07 07:54
VLAI?
Summary
The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/3627 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/bid/27675 vdb-entryx_refsource_BID
https://usercenter.checkpoint.com/usercenter/port… x_refsource_CONFIRM
http://secunia.com/advisories/28820 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/487735/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/0475 vdb-entryx_refsource_VUPEN
http://www.securitytracker.com/id?1019317 vdb-entryx_refsource_SECTRACK
http://digihax.com/ x_refsource_MISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:54:22.690Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3627"
          },
          {
            "name": "27675",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27675"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml"
          },
          {
            "name": "28820",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28820"
          },
          {
            "name": "20080207 Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487735/100/0/threaded"
          },
          {
            "name": "ADV-2008-0475",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0475"
          },
          {
            "name": "1019317",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019317"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://digihax.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3627"
        },
        {
          "name": "27675",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27675"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml"
        },
        {
          "name": "28820",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28820"
        },
        {
          "name": "20080207 Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487735/100/0/threaded"
        },
        {
          "name": "ADV-2008-0475",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0475"
        },
        {
          "name": "1019317",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019317"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://digihax.com/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0662",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3627",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3627"
            },
            {
              "name": "27675",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27675"
            },
            {
              "name": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml",
              "refsource": "CONFIRM",
              "url": "https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml"
            },
            {
              "name": "28820",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28820"
            },
            {
              "name": "20080207 Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487735/100/0/threaded"
            },
            {
              "name": "ADV-2008-0475",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0475"
            },
            {
              "name": "1019317",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019317"
            },
            {
              "name": "http://digihax.com/",
              "refsource": "MISC",
              "url": "http://digihax.com/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0662",
    "datePublished": "2008-02-08T01:00:00",
    "dateReserved": "2008-02-07T00:00:00",
    "dateUpdated": "2024-08-07T07:54:22.690Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4093 (GCVE-0-2005-4093)

Vulnerability from nvd – Published: 2005-12-08 11:00 – Updated: 2024-08-07 23:31
VLAI?
Summary
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/15757 vdb-entryx_refsource_BID
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
http://www.mail-archive.com/swinog%40lists.swinog… x_refsource_MISC
http://www.us.debian.org/security/2006/dsa-1237 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/17837 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015326 vdb-entryx_refsource_SECTRACK
http://www.mail-archive.com/swinog%40lists.swinog… x_refsource_MISC
http://secunia.com/advisories/23395 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2808 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:31:49.184Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "15757",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15757"
          },
          {
            "name": "20051207 Checkpoint SecureClient NGX Security Policy can easily be disabled",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html"
          },
          {
            "name": "DSA-1237",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.us.debian.org/security/2006/dsa-1237"
          },
          {
            "name": "17837",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17837"
          },
          {
            "name": "1015326",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015326"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html"
          },
          {
            "name": "23395",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23395"
          },
          {
            "name": "ADV-2005-2808",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2808"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-12-12T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "15757",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15757"
        },
        {
          "name": "20051207 Checkpoint SecureClient NGX Security Policy can easily be disabled",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html"
        },
        {
          "name": "DSA-1237",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.us.debian.org/security/2006/dsa-1237"
        },
        {
          "name": "17837",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17837"
        },
        {
          "name": "1015326",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015326"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html"
        },
        {
          "name": "23395",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23395"
        },
        {
          "name": "ADV-2005-2808",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2808"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4093",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "15757",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15757"
            },
            {
              "name": "20051207 Checkpoint SecureClient NGX Security Policy can easily be disabled",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html"
            },
            {
              "name": "http://www.mail-archive.com/swinog@lists.swinog.ch/msg00799.html",
              "refsource": "MISC",
              "url": "http://www.mail-archive.com/swinog@lists.swinog.ch/msg00799.html"
            },
            {
              "name": "DSA-1237",
              "refsource": "DEBIAN",
              "url": "http://www.us.debian.org/security/2006/dsa-1237"
            },
            {
              "name": "17837",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17837"
            },
            {
              "name": "1015326",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015326"
            },
            {
              "name": "http://www.mail-archive.com/swinog@lists.swinog.ch/msg00798.html",
              "refsource": "MISC",
              "url": "http://www.mail-archive.com/swinog@lists.swinog.ch/msg00798.html"
            },
            {
              "name": "23395",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23395"
            },
            {
              "name": "ADV-2005-2808",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2808"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4093",
    "datePublished": "2005-12-08T11:00:00",
    "dateReserved": "2005-12-08T00:00:00",
    "dateUpdated": "2024-08-07T23:31:49.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}