Korean
<< Back
VID 29079
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Check Point Firewall-1 HTTP Security Server has multiple format string vulnerabilities, which allow a remote attacker to execute arbitrary code via HTTP requests that cause format string specifiers to be used in an error message. A remote unauthenticated attacker may exploit one of these vulnerabilities and execute commands under the security context of the super-user, usually "SYSTEM", or "root".

* Platforms Affected:
Check Point Software Next Generation FP3 HF2
Check Point Software Next Generation FP3 HF1
Check Point Software Next Generation FP3
Check Point Software Next Generation FP2
Check Point Software Next Generation FP1
Check Point Software Next Generation
Check Point Software NG-AI R55
Check Point Software NG-AI R54
Check Point Software NG-AI

* References:
http://www.kb.cert.org/vuls/id/790771
http://www.checkpoint.com/techsupport/alerts/security_server.html
http://www.ciac.org/ciac/bulletins/o-072.shtml
http://xforce.iss.net/xforce/alerts/id/162
Recommendation Check Point has made fixes available to resolve this issue. Customers with support contracts may obtain fixes from Check Point support channels. For additional details, see the Check Point security advisory at http://www.checkpoint.com/techsupport/alerts/security_server.html .

As a workaround, if it is not required, disable HTTP Security Servers or the Application Intelligence component, as appropriate.
Related URL CVE-2004-0039 (CVE)
Related URL 9581 (SecurityFocus)
Related URL 14149 (ISS)