![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.12084 |
Category: | Denial of Service |
Title: | Multiple Checkpoint 4.x format strings |
Summary: | NOSUMMARY |
Description: | Description: The remote Checkpoint Firewall web server crashes when sent a specially formatted HTTP request. This bug is a solid indicator that the server is vulnerable to several Checkpoint FW-1 4.x bugs. Solution: Upgrade to Checkpoint-NG Risk factor: High |
Cross-Ref: |
BugTraq ID: 10820 BugTraq ID: 9581 Common Vulnerability Exposure (CVE) ID: CVE-2004-0039 http://www.securityfocus.com/bid/9581 Bugtraq: 20040205 Two checkpoint fw-1/vpn-1 vulns (Google Search) http://marc.info/?l=bugtraq&m=107604682227031&w=2 Cert/CC Advisory: TA04-036A http://www.us-cert.gov/cas/techalerts/TA04-036A.html CERT/CC vulnerability note: VU#790771 http://www.kb.cert.org/vuls/id/790771 Computer Incident Advisory Center Bulletin: O-072 http://www.ciac.org/ciac/bulletins/o-072.shtml ISS Security Advisory: 20040204 Checkpoint Firewall-1 HTTP Parsing Format String Vulnerabilities http://xforce.iss.net/xforce/alerts/id/162 XForce ISS Database: fw1-format-string(14149) https://exchange.xforce.ibmcloud.com/vulnerabilities/14149 |
Copyright | This script is Copyright (C) 2004 Tenable Network Security |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |