We have conducted a thorough analysis of the relevant code and verified that we are secure against this attack. We've tried to reproduce the attack on all VPN-1 versions from NG FP2 and above with and without HFAs. NOTE: the vendor has disputed this issue, stating "Check Point Security Alert Team has analyzed this report. Buffer overflow in the PKI Web Service in Check Point Firewall-1 PKI Web Service allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) Authorization or (2) Referer HTTP header to TCP port 18624. ** DISPUTED ** NOTE: this issue has been disputed by the vendor.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |