Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-1397

Overview

Vulnerability Score 6.5 6.5
CVE Id CVE-2008-1397
Last Modified 07 Mar 2011 10:07:02
Published 19 Mar 2008 08:44:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication SINGLE_INSTANCE

CVE-2008-1397

Summary

Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint.

Vulnerable Systems

Application

  • Checkpoint Check Point Vpn-1 Pro Ngx R61

  • Checkpoint Check Point Vpn-1 Pro Ngx R62 Ga

  • Checkpoint Vpn-1 Firewall-1 Ng Ai R55

  • Checkpoint Vpn-1 Ngx R60

  • Checkpoint Vpn-1 Power Utm Ngx R65 With Messaging Security

  • Checkpoint Vpn-1 Power Utm With Ngx R65


References

CERT-VN - VU#992585

CONFIRM - https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk34579

VUPEN - ADV-2008-0953

BID - 28299

MISC - http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf

SECUNIA - 29394

XF - vpn1-ipaddress-dos(41260)

SECTRACK - 1019666

MISC - http://puresecurity.com.au/index.php?action=fullnews&id=5


Last Updated: 27 May 2016 10:47:08