ID

VAR-200102-0084


CVE

CVE-2001-0082


TITLE

Check Point Firewall-1 of Fast Mode In TCP Fragment Vulnerability not checking

Trust: 0.8

sources: JVNDB: JVNDB-2000-000126

DESCRIPTION

Check Point VPN-1/FireWall-1 4.1 SP2 with Fastmode enabled allows remote attackers to bypass access restrictions via malformed, fragmented packets. Check Point of VPN-1 and FireWall-1 Product supports "Fast Mode" The option contains a vulnerability that could allow access to restricted services by bypassing access control.The service of the host whose communication is blocked by the firewall may be accessed. Firewall-1 is prone to a security bypass vulnerability. Fast Mode is a setting that turns off analysis of packets in tcp sessions after the TCP 3-way handshake has completed for speed-crtitical services. It is also reportedly possible to access hosts at least one hop away on the same interface as the target host being protected. In order for this to be possible, at least one TCP service on a host protected by the firewall must be accessible by the attacker to which a SYN can be sent legitimately. The vulnerability is due to a failure to handle malformed fragmented TCP segments. Check Point Software contacted SecurityFocus with an update regarding this issue. Check the solutions section for the update. Fastmode's valid version of Check Point VPN-1/FireWall-1 4.1 SP2 is vulnerable. A remote attacker can cause a denial of service by means of an extremely long URL request to the web management interface

Trust: 2.25

sources: NVD: CVE-2001-0082 // JVNDB: JVNDB-2000-000126 // BID: 88537 // BID: 2143 // VULHUB: VHN-2904

AFFECTED PRODUCTS

vendor:checkpointmodel:firewall-1scope:eqversion:4.1

Trust: 1.6

vendor:check pointmodel:vpn-1/firewall-1scope:lteversion:4.0sp7

Trust: 0.8

vendor:check pointmodel:vpn-1/firewall-1scope:lteversion:4.1sp2

Trust: 0.8

vendor:checkmodel:point software firewall-1 sp2scope:eqversion:4.1

Trust: 0.6

vendor:checkmodel:point software firewall-1 sp3scope:neversion:4.1

Trust: 0.3

sources: BID: 88537 // BID: 2143 // JVNDB: JVNDB-2000-000126 // CNNVD: CNNVD-200102-007 // NVD: CVE-2001-0082

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0082
value: HIGH

Trust: 1.0

NVD: CVE-2001-0082
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200102-007
value: HIGH

Trust: 0.6

VULHUB: VHN-2904
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2001-0082
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-2904
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-2904 // JVNDB: JVNDB-2000-000126 // CNNVD: CNNVD-200102-007 // NVD: CVE-2001-0082

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0082

THREAT TYPE

network

Trust: 0.6

sources: BID: 88537 // BID: 2143

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200102-007

CONFIGURATIONS

sources: JVNDB: JVNDB-2000-000126

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-2904

PATCH

title:Top Pageurl:http://www.checkpoint.co.jp/

Trust: 0.8

sources: JVNDB: JVNDB-2000-000126

EXTERNAL IDS

db:NVDid:CVE-2001-0082

Trust: 2.8

db:BIDid:2143

Trust: 1.1

db:JVNDBid:JVNDB-2000-000126

Trust: 0.8

db:CNNVDid:CNNVD-200102-007

Trust: 0.7

db:BUGTRAQid:20001218 FIREWALL-1 FASTMODE VULNERABILITY

Trust: 0.6

db:BIDid:88537

Trust: 0.4

db:EXPLOIT-DBid:20519

Trust: 0.1

db:SEEBUGid:SSVID-74392

Trust: 0.1

db:VULHUBid:VHN-2904

Trust: 0.1

sources: VULHUB: VHN-2904 // BID: 88537 // BID: 2143 // JVNDB: JVNDB-2000-000126 // CNNVD: CNNVD-200102-007 // NVD: CVE-2001-0082

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2000-12/0271.html

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2001-0082

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2001-0082

Trust: 0.8

url:http://www.securityfocus.com/bid/2143

Trust: 0.8

url:http://www.checkpoint.com/techsupport/alerts/fastmode.html

Trust: 0.3

url:http://www.checkpoint.com/products/security/firewall-1.html

Trust: 0.3

sources: VULHUB: VHN-2904 // BID: 88537 // BID: 2143 // JVNDB: JVNDB-2000-000126 // CNNVD: CNNVD-200102-007 // NVD: CVE-2001-0082

CREDITS

Unknown

Trust: 0.3

sources: BID: 88537

SOURCES

db:VULHUBid:VHN-2904
db:BIDid:88537
db:BIDid:2143
db:JVNDBid:JVNDB-2000-000126
db:CNNVDid:CNNVD-200102-007
db:NVDid:CVE-2001-0082

LAST UPDATE DATE

2024-08-14T14:53:59.538000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-2904date:2008-09-05T00:00:00
db:BIDid:88537date:2001-02-12T00:00:00
db:BIDid:2143date:2000-12-14T00:00:00
db:JVNDBid:JVNDB-2000-000126date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200102-007date:2005-10-20T00:00:00
db:NVDid:CVE-2001-0082date:2008-09-05T20:23:13.527

SOURCES RELEASE DATE

db:VULHUBid:VHN-2904date:2001-02-12T00:00:00
db:BIDid:88537date:2001-02-12T00:00:00
db:BIDid:2143date:2000-12-14T00:00:00
db:JVNDBid:JVNDB-2000-000126date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200102-007date:2001-02-12T00:00:00
db:NVDid:CVE-2001-0082date:2001-02-12T05:00:00