CVE-2004-0699
CVSS7.5
发布时间 :2004-09-28 00:00:00
修订时间 :2008-09-05 16:39:08
NMCOS    

[原文]Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote attackers to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data.


[CNNVD]Check Point VPN-1 ASN.1缓冲区溢出漏洞(CNNVD-200409-068)

        Check Point VPN-1产品的ASN.1译码库文件存在基于堆的缓冲区溢出漏洞。积极模式IKE生效时,远程攻击者可以通过初始化IKE协议并发送IKE畸形ASN.1数据包执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:checkpoint:firewall-1:4.1:sp6Checkpoint Firewall-1 4.1 SP6
cpe:/a:checkpoint:vpn-1Checkpoint VPN-1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0699
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0699
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200409-068
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/435358
(UNKNOWN)  CERT-VN  VU#435358
http://xforce.iss.net/xforce/xfdb/16824
(VENDOR_ADVISORY)  XF  vpn1-asn1-decoding-bo(16824)
http://xforce.iss.net/xforce/alerts/id/178
(VENDOR_ADVISORY)  ISS  20040728 Check Point VPN-1 ASN.1 Decoding Remote Compromise
http://www.checkpoint.com/techsupport/alerts/asn1.html
(VENDOR_ADVISORY)  CONFIRM  http://www.checkpoint.com/techsupport/alerts/asn1.html
http://www.ciac.org/ciac/bulletins/o-190.shtml
(UNKNOWN)  CIAC  O-190
http://secunia.com/advisories/12177/
(UNKNOWN)  SECUNIA  12177
http://www.securityfocus.com/bid/10820
(UNKNOWN)  BID  10820
http://www.osvdb.org/displayvuln.php?osvdb_id=8290
(UNKNOWN)  OSVDB  8290
http://securitytracker.com/alerts/2004/Jul/1010799.html
(UNKNOWN)  SECTRACK  1010799

- 漏洞信息

Check Point VPN-1 ASN.1缓冲区溢出漏洞
高危 缓冲区溢出
2004-09-28 00:00:00 2005-10-20 00:00:00
远程  
        Check Point VPN-1产品的ASN.1译码库文件存在基于堆的缓冲区溢出漏洞。积极模式IKE生效时,远程攻击者可以通过初始化IKE协议并发送IKE畸形ASN.1数据包执行任意代码。

- 公告与补丁

        The vendor has released fixes to address this vulnerability in affected products, please see the referenced CheckPoint advisory (ASN.1 Alert) for further details regarding obtaining and applying appropriate updates.

- 漏洞信息

8290
Check Point VPN-1 ASN.1 Decoding Heap Overflow
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

A remote overflow exists in Checkpoint VPN-1/Firewall-1 software. Checkpoint VPN-1/FireWall-1 software fails to properly santize ASN.1 decoding during the initial VPN tunnel encryption setup over ISAKMP resulting in a heap overflow. With a specially crafted request, an attacker can compromise the server resulting in a loss of confidentiality and integrity.

- 时间线

2004-07-28 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Checkpoint has released patches for each corresponding version to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Check Point VPN-1 ASN.1 Buffer Overflow Vulnerability
Boundary Condition Error 10820
Yes No
2004-07-28 12:00:00 2009-07-12 06:16:00
Discovery of this vulnerability is credited to Mark Dowd and Neel Mehta of the Internet Security Systems X-Force.

- 受影响的程序版本

Check Point Software VSX FireWall-1 GX
Check Point Software VPN-1/Firewall-1 VSX NG with AI Release 2
Check Point Software VPN-1/Firewall-1 VSX NG with AI Release 1
Check Point Software VPN-1/Firewall-1 VSX 2.0.1
Check Point Software VPN-1 VSX 2.0.1
Check Point Software SSL Network Extender
Check Point Software SecuRemote NG with Application Intelligence R56
Check Point Software SecuRemote 4.1
Check Point Software SecuRemote 4.0
Check Point Software SecureClient NG with Application Intelligence R56
Check Point Software SecureClient 4.1
Check Point Software SecureClient 4.0
Check Point Software Provider-1 NG with Application Intelligence R55
Check Point Software Provider-1 NG with Application Intelligence R54
Check Point Software NG-AI R55W
Check Point Software NG-AI R55
Check Point Software NG-AI R54
Check Point Software FireWall-1 VSX NG with Application Intelligence
Check Point Software FireWall-1 VSX 2.0.1
Check Point Software FireWall-1 Next Generation FP3
Check Point Software FireWall-1 GX 2.5
Check Point Software FireWall-1 GX 2.0

- 漏洞讨论

A remote buffer overflow vulnerability is reported in Check Point VPN-1 that may allow a remote attacker to execute arbitrary code in order to gain unauthorized access. This issue results from insufficient boundary checks performed by the application when processing user-supplied data.

This overflow occurs during the initial key exchange process, and can be triggered with a single UDP packet. Since ISAKMP uses the UDP transport, a spoofed source address can be used in an attack.

Check Point reports that for a single packet attack to succeed, VPN-1 must be configured for aggressive mode key exchange. Without aggressive mode, an attacker must initiate a real key negotiation session.

This vulnerability can lead to remote code execution in the context of the VPN-1 process. This can lead to a complete system compromise.

Check Point has released an advisory and fixes for this issue.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The vendor has released fixes to address this vulnerability in affected products, please see the referenced CheckPoint advisory (ASN.1 Alert) for further details regarding obtaining and applying appropriate updates.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站