ID

VAR-201411-0131


CVE

CVE-2014-8952


TITLE

Check Point Security Gateway Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-005486

DESCRIPTION

Multiple unspecified vulnerabilities in Check Point Security Gateway R75.40VS, R75.45, R75.46, R75.47, R76, R77, and R77.10, when the (1) IPS blade, (2) IPsec Remote Access, (3) Mobile Access / SSL VPN blade, (4) SSL Network Extender, (5) Identify Awareness blade, (6) HTTPS Inspection, (7) UserCheck, or (8) Data Leak Prevention blade module is enabled, allow remote attackers to cause a denial of service ("stability issue") via an unspecified "traffic condition.". Check Point Security Gateway If the following modules are enabled, service disruption (" Stability issue ") There are vulnerabilities that are put into a state. Errors can cause system instability. 2, the relevant URL Filtering blade and Application Control blade have errors, which can cause the system to hang. 3. There is an error in redirecting to the UserChec page, which can cause the system to crash. 4, related URL Filtering or Identity Awareness has a security vulnerability, an attacker can exploit the vulnerability to crash the system. It provides security functions such as unified security policies, URL filtering, and anti-virus. Successfully exploiting this issue allows remote attackers to cause denial-of-service conditions

Trust: 3.6

sources: NVD: CVE-2014-8952 // JVNDB: JVNDB-2014-005486 // CNVD: CNVD-2014-03736 // CNVD: CNVD-2014-08326 // CNNVD: CNNVD-201407-322 // BID: 67993 // VULHUB: VHN-76897

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2014-03736 // CNVD: CNVD-2014-08326

AFFECTED PRODUCTS

vendor:checkpointmodel:security gatewayscope:eqversion:r75.46

Trust: 1.6

vendor:checkpointmodel:security gatewayscope:eqversion:r77

Trust: 1.6

vendor:checkpointmodel:security gatewayscope:eqversion:r75.40

Trust: 1.6

vendor:checkpointmodel:security gatewayscope:eqversion:r76

Trust: 1.6

vendor:checkpointmodel:security gatewayscope:eqversion:r75.47

Trust: 1.6

vendor:checkpointmodel:security gatewayscope:eqversion:r75.45

Trust: 1.6

vendor:checkpointmodel:security gatewayscope:eqversion:r77.10

Trust: 1.6

vendor:checkmodel:point security gateways r77scope: - version: -

Trust: 1.2

vendor:check pointmodel:security gatewayscope:eqversion:r75.40vs

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:r75.45

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:r75.46

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:r75.47

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:r76

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:r77

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:r77.10

Trust: 0.8

vendor:checkmodel:point security gateways r77.10scope: - version: -

Trust: 0.6

vendor:checkmodel:point security gateways r76scope: - version: -

Trust: 0.6

vendor:checkmodel:point security gateways r75.40vsscope: - version: -

Trust: 0.6

vendor:checkmodel:point security gateways r75.45scope: - version: -

Trust: 0.6

vendor:checkmodel:point security gateways r75.46scope: - version: -

Trust: 0.6

vendor:checkmodel:point security gateways r75.47scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2014-03736 // CNVD: CNVD-2014-08326 // JVNDB: JVNDB-2014-005486 // CNNVD: CNNVD-201411-270 // NVD: CVE-2014-8952

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-8952
value: HIGH

Trust: 1.0

NVD: CVE-2014-8952
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-03736
value: HIGH

Trust: 0.6

CNVD: CNVD-2014-08326
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201411-270
value: HIGH

Trust: 0.6

VULHUB: VHN-76897
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-8952
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-03736
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2014-08326
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-76897
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-03736 // CNVD: CNVD-2014-08326 // VULHUB: VHN-76897 // JVNDB: JVNDB-2014-005486 // CNNVD: CNNVD-201411-270 // NVD: CVE-2014-8952

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2014-8952

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201407-322 // CNNVD: CNNVD-201411-270

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.3

sources: BID: 67993

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005486

PATCH

title:Important security and stability enhancements for Security Gatewayurl:https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk100431

Trust: 0.8

title:Patches for Multiple Denial of Service Vulnerabilities in Check Point Security Gatewaysurl:https://www.cnvd.org.cn/patchInfo/show/46508

Trust: 0.6

title:Patch for Check Point Security Gateways Denial of Service Vulnerability (CNVD-2014-08326)url:https://www.cnvd.org.cn/patchInfo/show/51937

Trust: 0.6

title:CapsuleDocsProxyR77_20url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54628

Trust: 0.6

sources: CNVD: CNVD-2014-03736 // CNVD: CNVD-2014-08326 // JVNDB: JVNDB-2014-005486 // CNNVD: CNNVD-201411-270

EXTERNAL IDS

db:NVDid:CVE-2014-8952

Trust: 3.4

db:SECUNIAid:58487

Trust: 2.9

db:BIDid:67993

Trust: 2.6

db:JVNDBid:JVNDB-2014-005486

Trust: 0.8

db:CNNVDid:CNNVD-201411-270

Trust: 0.7

db:CNVDid:CNVD-2014-03736

Trust: 0.6

db:CNVDid:CNVD-2014-08326

Trust: 0.6

db:CNNVDid:CNNVD-201407-322

Trust: 0.6

db:VULHUBid:VHN-76897

Trust: 0.1

sources: CNVD: CNVD-2014-03736 // CNVD: CNVD-2014-08326 // VULHUB: VHN-76897 // BID: 67993 // JVNDB: JVNDB-2014-005486 // CNNVD: CNNVD-201407-322 // CNNVD: CNNVD-201411-270 // NVD: CVE-2014-8952

REFERENCES

url:http://secunia.com/advisories/58487

Trust: 2.3

url:http://www.securityfocus.com/bid/67993

Trust: 1.7

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk100431

Trust: 1.6

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8952

Trust: 1.4

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/98762

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8952

Trust: 0.8

url:http://secunia.com/advisories/58487/

Trust: 0.6

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk100431

Trust: 0.1

sources: CNVD: CNVD-2014-03736 // CNVD: CNVD-2014-08326 // VULHUB: VHN-76897 // JVNDB: JVNDB-2014-005486 // CNNVD: CNNVD-201407-322 // CNNVD: CNNVD-201411-270 // NVD: CVE-2014-8952

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 67993

SOURCES

db:CNVDid:CNVD-2014-03736
db:CNVDid:CNVD-2014-08326
db:VULHUBid:VHN-76897
db:BIDid:67993
db:JVNDBid:JVNDB-2014-005486
db:CNNVDid:CNNVD-201407-322
db:CNNVDid:CNNVD-201411-270
db:NVDid:CVE-2014-8952

LAST UPDATE DATE

2025-04-13T23:18:14.781000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-03736date:2014-06-19T00:00:00
db:CNVDid:CNVD-2014-08326date:2014-11-18T00:00:00
db:VULHUBid:VHN-76897date:2017-09-08T00:00:00
db:BIDid:67993date:2014-11-19T00:57:00
db:JVNDBid:JVNDB-2014-005486date:2014-11-18T00:00:00
db:CNNVDid:CNNVD-201407-322date:2014-07-15T00:00:00
db:CNNVDid:CNNVD-201411-270date:2014-11-17T00:00:00
db:NVDid:CVE-2014-8952date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-03736date:2014-06-19T00:00:00
db:CNVDid:CNVD-2014-08326date:2014-11-18T00:00:00
db:VULHUBid:VHN-76897date:2014-11-16T00:00:00
db:BIDid:67993date:2014-06-05T00:00:00
db:JVNDBid:JVNDB-2014-005486date:2014-11-18T00:00:00
db:CNNVDid:CNNVD-201407-322date:2014-06-05T00:00:00
db:CNNVDid:CNNVD-201411-270date:2014-11-17T00:00:00
db:NVDid:CVE-2014-8952date:2014-11-16T17:59:08.050