ID

VAR-E-200407-0196


CVE

cve_id:CVE-2004-0699

Trust: 0.3

sources: BID: 10820

TITLE

Check Point VPN-1 ASN.1 Buffer Overflow Vulnerability

Trust: 0.3

sources: BID: 10820

DESCRIPTION

A remote buffer overflow vulnerability is reported in Check Point VPN-1 that may allow a remote attacker to execute arbitrary code in order to gain unauthorized access. This issue results from insufficient boundary checks performed by the application when processing user-supplied data.
This overflow occurs during the initial key exchange process, and can be triggered with a single UDP packet. Since ISAKMP uses the UDP transport, a spoofed source address can be used in an attack.
Check Point reports that for a single packet attack to succeed, VPN-1 must be configured for aggressive mode key exchange. Without aggressive mode, an attacker must initiate a real key negotiation session.
This vulnerability can lead to remote code execution in the context of the VPN-1 process. This can lead to a complete system compromise.
Check Point has released an advisory and fixes for this issue.

Trust: 0.3

sources: BID: 10820

AFFECTED PRODUCTS

vendor:checkmodel:point software vsx firewall-1 gxscope: - version: -

Trust: 0.3

vendor:checkmodel:point software vpn-1/firewall-1 vsx ng with ai releasescope:eqversion:2

Trust: 0.3

vendor:checkmodel:point software vpn-1/firewall-1 vsx ng with ai releasescope:eqversion:1

Trust: 0.3

vendor:checkmodel:point software vpn-1/firewall-1 vsxscope:eqversion:2.0.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 vsxscope:eqversion:2.0.1

Trust: 0.3

vendor:checkmodel:point software ssl network extenderscope: - version: -

Trust: 0.3

vendor:checkmodel:point software securemote ng with application intelligence r56scope: - version: -

Trust: 0.3

vendor:checkmodel:point software securemotescope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software securemotescope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software secureclient ng with application intelligence r56scope: - version: -

Trust: 0.3

vendor:checkmodel:point software secureclientscope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software secureclientscope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software provider-1 ng with application intelligence r55scope: - version: -

Trust: 0.3

vendor:checkmodel:point software provider-1 ng with application intelligence r54scope: - version: -

Trust: 0.3

vendor:checkmodel:point software ng-ai r55wscope: - version: -

Trust: 0.3

vendor:checkmodel:point software ng-ai r55scope: - version: -

Trust: 0.3

vendor:checkmodel:point software ng-ai r54scope: - version: -

Trust: 0.3

vendor:checkmodel:point software firewall-1 vsx ng with application intelligencescope: - version: -

Trust: 0.3

vendor:checkmodel:point software firewall-1 vsxscope:eqversion:2.0.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 next generation fp3scope: - version: -

Trust: 0.3

vendor:checkmodel:point software firewall-1 gxscope:eqversion:2.5

Trust: 0.3

vendor:checkmodel:point software firewall-1 gxscope:eqversion:2.0

Trust: 0.3

sources: BID: 10820

EXPLOIT

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

Trust: 0.3

sources: BID: 10820

PRICE

Free

Trust: 0.3

sources: BID: 10820

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 10820

CREDITS

Discovery of this vulnerability is credited to Mark Dowd and Neel Mehta of the Internet Security Systems X-Force.

Trust: 0.3

sources: BID: 10820

EXTERNAL IDS

db:NVDid:CVE-2004-0699

Trust: 0.3

db:BIDid:10820

Trust: 0.3

sources: BID: 10820

REFERENCES

url:http://xforce.iss.net/xforce/alerts/id/178

Trust: 0.3

url:http://www.checkpoint.com/techsupport/alerts/asn1.html

Trust: 0.3

url:http://www.checkpoint.com/techsupport/

Trust: 0.3

sources: BID: 10820

SOURCES

db:BIDid:10820

LAST UPDATE DATE

2022-07-27T09:44:13.585000+00:00


SOURCES UPDATE DATE

db:BIDid:10820date:2009-07-12T06:16:00

SOURCES RELEASE DATE

db:BIDid:10820date:2004-07-28T00:00:00