-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 * subscribe at http://techPolice.com Hole found in Check Point's FireWall-1 and VPN-1 By Jaikumar Vijayan, Computerworld July 11, 2001 2:41 am PT A VULNERABILITY IN Check Point Software's Firewall-1 and VPN-1 firewalls may allow intruders to tunnel illegitimate traffic into or out of corporate networks. The hole was discovered last month by Inside Security, a spin-off of the University of Stuttgart's security team in Germany. The hole could be exploited to passively snoop inside corporate networks or to launch certain types of denial-of-service attacks, according to the CERT Coordination Center security response team at Carnegie Mellon University, which issued a bulletin on the vulnerability Monday. "This is a pretty serious vulnerability [because] Check Point is one of the most widely deployed firewalls on the Internet," said Ian Finlay, a member of the CERT team. The vulnerability involves a proprietary protocol called RDP that is used in Check Point's firewalls for internally communicating between software components. By default, VPN-1/FireWall-1 allows RDP packets to traverse firewall gateways to simplify encryption setup, according to Check Point's advisory on the topic. Under some conditions, malicious packets with RDP headers could be constructed that would be allowed across the firewall, according to the Check Point bulletin. Users can get around the problem by installing a patch from Check Point. Until the patch can be applied, users can reduce their risks by configuring their routers to block access to the port that is exploited by the vulnerability, CERT said in its advisory. Although there have been no reported security incidents related to this vulnerability, CERT is recommending that all affected sites upgrade their software as soon as possible. "The thing to keep in mind is that the very nature of a firewall is to block traffic from reaching your internal network. This is a situation where that assumed fundamental protection [is breached]" said Shawn Hernan, a CERT member. For more enterprise computing news, go to www.computerworld.com . Copyright (c) 2000 Computerworld. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com> iQA/AwUBO0yg+KZbWktVMW3TEQIdiwCdHQiWCev4BFm4/EPIIrReldcX9AAAn2Ml CpJaVbKd3I1U20qeqK4lmHxL =ee77 -----END PGP SIGNATURE----- ---------- COOL SAVINGS, HOT DEALS, FREE STUFF! ------------ Subscribe to TopOffers & receive great deals from Topica partners! Business 2.0, IBM, Sephora and more! http://click.topica.com/caaabYJb1dhr0b2EDp2f/ ------------------------------------------------------------ --via http://techPolice.com archive: http://theMezz.com/cybercrime/archive subscribe: [EMAIL PROTECTED] --via http://theMezz.com ==^================================================================ EASY UNSUBSCRIBE click here: http://topica.com/u/?b1dhr0.b2EDp2 Or send an email To: [EMAIL PROTECTED] This email was sent to: archive@jab.org T O P I C A -- Register now to manage your mail! http://www.topica.com/partner/tag02/register ==^================================================================