CERTA-2001-AVI-075

Vulnerability from certfr_avis - Published: - Updated:

Le port 259/UDP n'est pas correctement bloqué par Firewall-1.

Description

RDP de CheckPoint est un protocole propriétaire différent du protocole RDP (Reliable Data Protocol décrit par la RFC 908). Le port 259/UDP de Firewall-1, permet d'envoyer des commandes simples RDP chiffrées au garde barrière.

Malheureusement, une mauvaise implémentation des règles de sécurité du logiciel, permet à des paquets UDP de traverser le port 259 du garde barrière dans n'importe quel sens sans être bloqué par ce dernier.

Contournement provisoire

Filtrer le port 259/UDP sur les routeurs de périphérie.

Solution

Appliquer le correctif de CheckPoint après avoir installé le Service Pack 4 :

http://www.checkpoint.com/techsupport/downloads.html

Et installer à nouveau les règles de sécurité.

CheckPoint Firewall-1 et VPN-1 version 4.1.

Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eCheckPoint Firewall-1 et VPN-1 version 4.1.\u003c/P\u003e",
  "content": "## Description\n\nRDP de CheckPoint est un protocole propri\u00e9taire diff\u00e9rent du protocole\nRDP (Reliable Data Protocol d\u00e9crit par la RFC 908). Le port 259/UDP de\nFirewall-1, permet d\u0027envoyer des commandes simples RDP chiffr\u00e9es au\ngarde barri\u00e8re.\n\nMalheureusement, une mauvaise impl\u00e9mentation des r\u00e8gles de s\u00e9curit\u00e9 du\nlogiciel, permet \u00e0 des paquets UDP de traverser le port 259 du garde\nbarri\u00e8re dans n\u0027importe quel sens sans \u00eatre bloqu\u00e9 par ce dernier.\n\n## Contournement provisoire\n\nFiltrer le port 259/UDP sur les routeurs de p\u00e9riph\u00e9rie.\n\n## Solution\n\nAppliquer le correctif de CheckPoint apr\u00e8s avoir install\u00e9 le Service\nPack 4 :\n\n    http://www.checkpoint.com/techsupport/downloads.html\n\nEt installer \u00e0 nouveau les r\u00e8gles de s\u00e9curit\u00e9.\n",
  "cves": [],
  "links": [
    {
      "title": "L\u0027avis de s\u00e9curit\u00e9 de Checkpoint :",
      "url": "http://www.checkpoint.com/techsupport/alerts/rdp.html"
    }
  ],
  "reference": "CERTA-2001-AVI-075",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2001-07-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement des r\u00e8gles de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Le port 259/UDP n\u0027est pas correctement bloqu\u00e9 par Firewall-1.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de Firewall-1",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de Checkpoint 2001-07-09",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…