Check Point Firewall-1 Spoofed Source Denial of Service Vulnerability

BID:1419

Info

Check Point Firewall-1 Spoofed Source Denial of Service Vulnerability

Bugtraq ID: 1419
Class: Configuration Error
CVE:
Remote: Yes
Local: No
Published: Jul 05 2000 12:00AM
Updated: Jul 05 2000 12:00AM
Credit: The exploit credits antipent <[email protected]> with discovery.
Vulnerable: Check Point Software Firewall-1 4.1
Check Point Software Firewall-1 4.0
Check Point Software Firewall-1 3.0
Not Vulnerable:

Discussion

Check Point Firewall-1 Spoofed Source Denial of Service Vulnerability

If Checkpoint Firewall-1 receives a number of spoofed UDP packets with Source IP = Destination IP, the firewall (and likely the machine hosting it) crashes.

NOTE:

This vulnerability while being posted to Bugtraq is currently being denied as a problem by the vendor. The following text was sent to SecurityFocus.

"Check Point takes this and all other possible security issues very seriously. In this case, we have made every effort to work with the authors and reproduce the reported behavior. However, even after extensive testing we have been unable to reproduce this vulnerability. This testing was done both with and without IP Spoofing protection enabled, with the provided source code and other tools. The authors could not provide us with valid FireWall-1 version information, although 3.0, 4.0, and 4.1 are listed as vulnerable; please note that version 3.0 is no longer supported on non-embedded platforms.

At this time, Check Point does not believe this is an actual vulnerability. If anyone has successfully reproduced this condition or has further information, please contact [email protected]."

References

Check Point Firewall-1 Spoofed Source Denial of Service Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report