CVE-2008-1397
Summary
| CVE | CVE-2008-1397 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-03-20 00:44:00 UTC |
| Updated | 2017-08-08 01:30:00 UTC |
| Description | Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint. |
Risk And Classification
Problem Types: CWE-264
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Checkpoint | Check Point Vpn-1 Pro | ngx_r61 | All | All | All |
| Application | Checkpoint | Check Point Vpn-1 Pro | ngx_r62_ga | All | All | All |
| Application | Checkpoint | Check Point Vpn-1 Pro | ngx_r61 | All | All | All |
| Application | Checkpoint | Check Point Vpn-1 Pro | ngx_r62_ga | All | All | All |
| Application | Checkpoint | Vpn-1 | ngx_r60 | All | pro | All |
| Application | Checkpoint | Vpn-1 | ngx_r60 | All | pro | All |
| Application | Checkpoint | Vpn-1 Firewall-1 | ng_ai_r55 | All | All | All |
| Application | Checkpoint | Vpn-1 Firewall-1 | ng_ai_r55 | All | All | All |
| Application | Checkpoint | Vpn-1 Power Utm | ngx_r65_with_messaging_security | All | All | All |
| Application | Checkpoint | Vpn-1 Power Utm | ngx_r65_with_messaging_security | All | All | All |
| Application | Checkpoint | Vpn-1 Power Utm With Ngx | r65 | All | All | All |
| Application | Checkpoint | Vpn-1 Power Utm With Ngx | r65 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Pure Security | MISC | puresecurity.com.au | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| CheckPoint VPN-1 IP Address Collision Security Issue - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | Vendor Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Support, Support Requests, Training, Documentation, and Knowledge base for Check Point products and services | CONFIRM | supportcenter.checkpoint.com | Patch |
| www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%... | MISC | www.puresecurity.com.au | Exploit |
| US-CERT Vulnerability Notes | CERT-VN | www.kb.cert.org | US Government Resource |
| Check Point VPN-1 IP Address Collision Denial of Service Vulnerability | BID | www.securityfocus.com | |
| Check Point VPN-1 SecuRemote Lets Remote Users Deny Service - SecurityTracker | SECTRACK | www.securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.