ID

VAR-200109-0012


CVE

CVE-2001-1101


TITLE

Check Point Firewall-1 Client Log Viewer Symbolic Link Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200109-023

DESCRIPTION

The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack. Check Point Firewall-1 is a commercial firewall implementation designed for small to enterprise sized networks. A problem with Firewall-1 makes it possible for a local user to overwrite critical system files. This makes it possible for a user with administrative access to Firewall-1 and local shell access to deny service to legitimate users of the system. This can cause a local denial of service attack

Trust: 1.26

sources: NVD: CVE-2001-1101 // BID: 3303 // VULHUB: VHN-3906

AFFECTED PRODUCTS

vendor:checkpointmodel:firewall-1scope:eqversion:4.0

Trust: 1.6

vendor:checkpointmodel:firewall-1scope:eqversion:3.0

Trust: 1.6

vendor:checkpointmodel:firewall-1scope:eqversion:4.1

Trust: 1.6

vendor:checkmodel:point software firewall-1 sp2scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp1scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1scope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software firewall-1scope:eqversion:3.0

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp4scope:neversion:4.1

Trust: 0.3

sources: BID: 3303 // CNNVD: CNNVD-200109-023 // NVD: CVE-2001-1101

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-1101
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200109-023
value: MEDIUM

Trust: 0.6

VULHUB: VHN-3906
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2001-1101
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-3906
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-3906 // CNNVD: CNNVD-200109-023 // NVD: CVE-2001-1101

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-1101

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200109-023

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200109-023

EXTERNAL IDS

db:NVDid:CVE-2001-1101

Trust: 2.0

db:BIDid:3303

Trust: 2.0

db:CNNVDid:CNNVD-200109-023

Trust: 0.7

db:XFid:1

Trust: 0.6

db:XFid:7095

Trust: 0.6

db:BUGTRAQid:20010908 BUG IN REMOTE GUI ACCESS IN CHECKPOINT FIREWALL

Trust: 0.6

db:VULHUBid:VHN-3906

Trust: 0.1

sources: VULHUB: VHN-3906 // BID: 3303 // CNNVD: CNNVD-200109-023 // NVD: CVE-2001-1101

REFERENCES

url:http://www.securityfocus.com/bid/3303

Trust: 1.7

url:http://www.securityfocus.com/archive/1/212826

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/7095

Trust: 1.1

url:http://xforce.iss.net/static/7095.php

Trust: 0.6

sources: VULHUB: VHN-3906 // CNNVD: CNNVD-200109-023 // NVD: CVE-2001-1101

CREDITS

This vulnerability was announced by Alan Darien <adarien@securetrendz.com> via Bugtraq on September 8, 2001.

Trust: 0.3

sources: BID: 3303

SOURCES

db:VULHUBid:VHN-3906
db:BIDid:3303
db:CNNVDid:CNNVD-200109-023
db:NVDid:CVE-2001-1101

LAST UPDATE DATE

2024-08-14T12:26:00.500000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-3906date:2017-12-19T00:00:00
db:BIDid:3303date:2009-07-11T07:56:00
db:CNNVDid:CNNVD-200109-023date:2006-01-04T00:00:00
db:NVDid:CVE-2001-1101date:2017-12-19T02:29:33.127

SOURCES RELEASE DATE

db:VULHUBid:VHN-3906date:2001-09-08T00:00:00
db:BIDid:3303date:2001-09-08T00:00:00
db:CNNVDid:CNNVD-200109-023date:2001-09-08T00:00:00
db:NVDid:CVE-2001-1101date:2001-09-08T04:00:00