|发布时间 :2004-09-28 00:00:00|
|修订时间 :2017-07-10 21:30:23|
[原文]Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote attackers to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data.
[CNNVD]Check Point VPN-1 ASN.1缓冲区溢出漏洞(CNNVD-200409-068)
Check Point VPN-1产品的ASN.1译码库文件存在基于堆的缓冲区溢出漏洞。积极模式IKE生效时，远程攻击者可以通过初始化IKE协议并发送IKE畸形ASN.1数据包执行任意代码。
- CVSS (基础分值)
- CPE (受影响的平台与产品)
|cpe:/a:checkpoint:firewall-1:4.1:sp6||Checkpoint Firewall-1 4.1 SP6|
- OVAL (用于检测的技术细节)
(UNKNOWN) SECTRACK 1010799
(VENDOR_ADVISORY) CONFIRM http://www.checkpoint.com/techsupport/alerts/asn1.html
(UNKNOWN) CIAC O-190
(UNKNOWN) CERT-VN VU#435358
(UNKNOWN) BID 10820
(VENDOR_ADVISORY) ISS 20040728 Check Point VPN-1 ASN.1 Decoding Remote Compromise
(UNKNOWN) XF vpn1-asn1-decoding-bo(16824)
|Check Point VPN-1 ASN.1缓冲区溢出漏洞|
|2004-09-28 00:00:00||2005-10-20 00:00:00|
|Check Point VPN-1产品的ASN.1译码库文件存在基于堆的缓冲区溢出漏洞。积极模式IKE生效时，远程攻击者可以通过初始化IKE协议并发送IKE畸形ASN.1数据包执行任意代码。|
|The vendor has released fixes to address this vulnerability in affected products, please see the referenced CheckPoint advisory (ASN.1 Alert) for further details regarding obtaining and applying appropriate updates.|
|Check Point VPN-1 ASN.1 Decoding Heap Overflow|
|Remote / Network Access||Input Manipulation|
|Loss of Confidentiality, Loss of Integrity|
|A remote overflow exists in Checkpoint VPN-1/Firewall-1 software. Checkpoint VPN-1/FireWall-1 software fails to properly santize ASN.1 decoding during the initial VPN tunnel encryption setup over ISAKMP resulting in a heap overflow. With a specially crafted request, an attacker can compromise the server resulting in a loss of confidentiality and integrity.|
|Currently, there are no known workarounds or upgrades to correct this issue. However, Checkpoint has released patches for each corresponding version to address this vulnerability.|
|Check Point VPN-1 ASN.1 Buffer Overflow Vulnerability|
|Boundary Condition Error||10820|
|2004-07-28 12:00:00||2009-07-12 06:16:00|
|Discovery of this vulnerability is credited to Mark Dowd and Neel Mehta of the Internet Security Systems X-Force.|
|Check Point Software VSX FireWall-1 GX
Check Point Software VPN-1/Firewall-1 VSX NG with AI Release 2
Check Point Software VPN-1/Firewall-1 VSX NG with AI Release 1
Check Point Software VPN-1/Firewall-1 VSX 2.0.1
Check Point Software VPN-1 VSX 2.0.1
Check Point Software SSL Network Extender
Check Point Software SecuRemote NG with Application Intelligence R56
Check Point Software SecuRemote 4.1
Check Point Software SecuRemote 4.0
Check Point Software SecureClient NG with Application Intelligence R56
Check Point Software SecureClient 4.1
Check Point Software SecureClient 4.0
Check Point Software Provider-1 NG with Application Intelligence R55
Check Point Software Provider-1 NG with Application Intelligence R54
Check Point Software NG-AI R55W
Check Point Software NG-AI R55
Check Point Software NG-AI R54
Check Point Software FireWall-1 VSX NG with Application Intelligence
Check Point Software FireWall-1 VSX 2.0.1
Check Point Software FireWall-1 Next Generation FP3
Check Point Software FireWall-1 GX 2.5
Check Point Software FireWall-1 GX 2.0
|A remote buffer overflow vulnerability is reported in Check Point VPN-1 that may allow a remote attacker to execute arbitrary code in order to gain unauthorized access. This issue results from insufficient boundary checks performed by the application when processing user-supplied data.
This overflow occurs during the initial key exchange process, and can be triggered with a single UDP packet. Since ISAKMP uses the UDP transport, a spoofed source address can be used in an attack.
Check Point reports that for a single packet attack to succeed, VPN-1 must be configured for aggressive mode key exchange. Without aggressive mode, an attacker must initiate a real key negotiation session.
This vulnerability can lead to remote code execution in the context of the VPN-1 process. This can lead to a complete system compromise.
Check Point has released an advisory and fixes for this issue.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.
The vendor has released fixes to address this vulnerability in affected products, please see the referenced CheckPoint advisory (ASN.1 Alert) for further details regarding obtaining and applying appropriate updates.