Korean
<< Back
VID 12052
Severity 40
Port
Protocol ICMP
Class Protocol
Detailed Description The machine appears to be crashed by the flooding attack using incorrectly fragmented packets. This is known as the 'jolt2' denial of service attack. Especially, Check Point FireWall-1 versions 1.4.0 and 1.4.1 are vulnerable to a packet fragmentation denial of service. By sending illegally fragmented packets directly to or routed through Check Point FireWall-1, it is possible to force the firewall to use 100% of available processor time logging these packets. The FireWall-1 rulebase cannot prevent this attack and it is not logged in the firewall logs.

* Note: This check can also affect routers on the network path to target machine.

* References:
http://www.checkpoint.com/techsupport/alerts/list_vun.html#IP_Fragmentation
http://archives.neohapsis.com/archives/bugtraq/2000-05/0473.html
http://www.kb.cert.org/vuls/id/35958
http://www.checkpoint.com/techsupport/alerts/ipfrag_dos.html

* Platforms Affected:
Check Point Firewalls Any version
Recommendation For Check Point Firewall and VPN:
Apply the latest Service Pack or Hotfix for this vulnerability, as listed in the Check Point Technical Support Alert at http://www.checkpoint.com/techsupport/alerts/ipfrag_dos.html

As a workaround, disable the console logging by typing the following command at the FireWall-1 module(s):

$FWDIR/bin/fw ctl debug -buf

This command can be added to the $FWDIR/bin/fw/fwstart command in order to be enabled when the firewall software is restarted.
Related URL CVE-2000-0482 (CVE)
Related URL 1312 (SecurityFocus)
Related URL 4609 (ISS)