-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

* subscribe at http://techPolice.com 
 
Hole found in Check Point's FireWall-1 and VPN-1 

By Jaikumar Vijayan, Computerworld 
July 11, 2001 2:41 am PT

  
 A VULNERABILITY IN Check Point Software's Firewall-1 and VPN-1
firewalls may allow intruders to tunnel illegitimate traffic into or
out of corporate networks.

The hole was discovered last month by Inside Security, a spin-off of
the University of Stuttgart's security team in Germany. The hole
could be exploited to passively snoop inside corporate networks or to
launch certain types of denial-of-service attacks, according to the
CERT Coordination Center security response team at Carnegie Mellon
University, which issued a bulletin on the vulnerability Monday. 

"This is a pretty serious vulnerability [because] Check Point is one
of the most widely deployed firewalls on the Internet," said Ian
Finlay, a member of the CERT team. 

The vulnerability involves a proprietary protocol called RDP that is
used in Check Point's firewalls for internally communicating between
software components. By default, VPN-1/FireWall-1 allows RDP packets
to traverse firewall gateways to simplify encryption setup, according
to Check Point's advisory on the topic. 

Under some conditions, malicious packets with RDP headers could be
constructed that would be allowed across the firewall, according to
the Check Point bulletin. 

Users can get around the problem by installing a patch from Check
Point. 

Until the patch can be applied, users can reduce their risks by
configuring their routers to block access to the port that is
exploited by the vulnerability, CERT said in its advisory. 

Although there have been no reported security incidents related to
this vulnerability, CERT is recommending that all affected sites
upgrade their software as soon as possible. 

"The thing to keep in mind is that the very nature of a firewall is
to block traffic from reaching your internal network. This is a
situation where that assumed fundamental protection [is breached]"
said Shawn Hernan, a CERT member.

For more enterprise computing news, go to www.computerworld.com .
Copyright (c) 2000 Computerworld. All rights reserved. 
 



-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>

iQA/AwUBO0yg+KZbWktVMW3TEQIdiwCdHQiWCev4BFm4/EPIIrReldcX9AAAn2Ml
CpJaVbKd3I1U20qeqK4lmHxL
=ee77
-----END PGP SIGNATURE-----


---------- COOL SAVINGS, HOT DEALS, FREE STUFF! ------------
Subscribe to TopOffers & receive great deals from Topica partners! 
Business 2.0, IBM, Sephora and more! 
http://click.topica.com/caaabYJb1dhr0b2EDp2f/
------------------------------------------------------------

--via http://techPolice.com
archive: http://theMezz.com/cybercrime/archive
subscribe: [EMAIL PROTECTED]
--via http://theMezz.com

==^================================================================
EASY UNSUBSCRIBE click here: http://topica.com/u/?b1dhr0.b2EDp2
Or send an email To: [EMAIL PROTECTED]
This email was sent to: archive@jab.org

T O P I C A -- Register now to manage your mail!
http://www.topica.com/partner/tag02/register
==^================================================================

Reply via email to