var-200901-0056
Vulnerability from variot
Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264. Check Point VPN-1 is prone to an information-disclosure weakness. An attacker can exploit this issue to learn the IP of devices on the internal network. This may aid in further attacks. ----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list?
Click here to learn more: http://secunia.com/advisories/business_solutions/
TITLE: Checkpoint VPN-1 Information Disclosure Vulnerability
SECUNIA ADVISORY ID: SA32728
VERIFY ADVISORY: http://secunia.com/advisories/32728/
CRITICAL: Not critical
IMPACT: Exposure of system information
WHERE:
From remote
SOFTWARE: Check Point VPN-1/FireWall-1 NGX http://secunia.com/advisories/product/6010/ Check Point VPN-1 UTM NGX http://secunia.com/advisories/product/13346/ Check Point VPN-1 Power NGX http://secunia.com/advisories/product/13348/
DESCRIPTION: Tim Brown and Mark Lowe have reported a vulnerability in Checkpoint VPN-1 products, which can be exploited by malicious people to disclose certain system information.
The vulnerability is caused due to an error in the port address translation (PAT) feature when responding with ICMP time exceeded messages. This can be exploited to disclose e.g.
SOLUTION: The vendor recommends to block ICMP errors.
PROVIDED AND/OR DISCOVERED BY: Tim Brown and Mark Lowe, Portcullis Computer Security
ORIGINAL ADVISORY: CheckPoint (Solution ID: sk36321): https://supportcenter.checkpoint.com/supportcenter/index.jsp
Portcullis Computer Security: http://www.portcullis.co.uk/293.php
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200901-0056", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vpn-1", "scope": "eq", "trust": 1.6, "vendor": "checkpoint", "version": "r55" }, { "model": "vpn-1", "scope": "eq", "trust": 1.6, "vendor": "checkpoint", "version": "r65" }, { "model": "vpn-1 power/utm", "scope": "eq", "trust": 0.8, "vendor": "check point", "version": "ngx r65" }, { "model": "point software vpn-1 power/utm ngx r65", "scope": null, "trust": 0.3, "vendor": "check", "version": null } ], "sources": [ { "db": "BID", "id": "32306" }, { "db": "JVNDB", "id": "JVNDB-2008-002165" }, { "db": "CNNVD", "id": "CNNVD-200901-038" }, { "db": "NVD", "id": "CVE-2008-5849" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:checkpoint:vpn-1_power_utm", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002165" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tim Brown securityfocus@machine.org.uk", "sources": [ { "db": "CNNVD", "id": "CNNVD-200901-038" } ], "trust": 0.6 }, "cve": "CVE-2008-5849", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2008-5849", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-35974", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-5849", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-5849", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200901-038", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-35974", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-35974" }, { "db": "JVNDB", "id": "JVNDB-2008-002165" }, { "db": "CNNVD", "id": "CNNVD-200901-038" }, { "db": "NVD", "id": "CVE-2008-5849" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264. Check Point VPN-1 is prone to an information-disclosure weakness. \nAn attacker can exploit this issue to learn the IP of devices on the internal network. This may aid in further attacks. ----------------------------------------------------------------------\n\nDid you know that a change in our assessment rating, exploit code\navailability, or if an updated patch is released by the vendor, is\nnot part of this mailing-list?\n\nClick here to learn more:\nhttp://secunia.com/advisories/business_solutions/\n\n----------------------------------------------------------------------\n\nTITLE:\nCheckpoint VPN-1 Information Disclosure Vulnerability\n\nSECUNIA ADVISORY ID:\nSA32728\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32728/\n\nCRITICAL:\nNot critical\n\nIMPACT:\nExposure of system information\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nCheck Point VPN-1/FireWall-1 NGX\nhttp://secunia.com/advisories/product/6010/\nCheck Point VPN-1 UTM NGX\nhttp://secunia.com/advisories/product/13346/\nCheck Point VPN-1 Power NGX\nhttp://secunia.com/advisories/product/13348/\n\nDESCRIPTION:\nTim Brown and Mark Lowe have reported a vulnerability in Checkpoint\nVPN-1 products, which can be exploited by malicious people to\ndisclose certain system information. \n\nThe vulnerability is caused due to an error in the port address\ntranslation (PAT) feature when responding with ICMP time exceeded\nmessages. This can be exploited to disclose e.g. \n\nSOLUTION:\nThe vendor recommends to block ICMP errors. \n\nPROVIDED AND/OR DISCOVERED BY:\nTim Brown and Mark Lowe, Portcullis Computer Security\n\nORIGINAL ADVISORY:\nCheckPoint (Solution ID: sk36321):\nhttps://supportcenter.checkpoint.com/supportcenter/index.jsp\n\nPortcullis Computer Security:\nhttp://www.portcullis.co.uk/293.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-5849" }, { "db": "JVNDB", "id": "JVNDB-2008-002165" }, { "db": "BID", "id": "32306" }, { "db": "VULHUB", "id": "VHN-35974" }, { "db": "PACKETSTORM", "id": "72178" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "32306", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2008-5849", "trust": 2.8 }, { "db": "SECUNIA", "id": "32728", "trust": 2.6 }, { "db": "VUPEN", "id": "ADV-2008-3229", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2008-002165", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200901-038", "trust": 0.7 }, { "db": "XF", "id": "46645", "trust": 0.6 }, { "db": "XF", "id": "1", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-35974", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "72178", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-35974" }, { "db": "BID", "id": "32306" }, { "db": "JVNDB", "id": "JVNDB-2008-002165" }, { "db": "PACKETSTORM", "id": "72178" }, { "db": "CNNVD", "id": "CNNVD-200901-038" }, { "db": "NVD", "id": "CVE-2008-5849" } ] }, "id": "VAR-200901-0056", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-35974" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:19:19.682000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "sk36321", "trust": 0.8, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk36321" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002165" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-35974" }, { "db": "JVNDB", "id": "JVNDB-2008-002165" }, { "db": "NVD", "id": "CVE-2008-5849" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/32306" }, { "trust": 2.5, "url": "http://www.vupen.com/english/advisories/2008/3229" }, { "trust": 2.0, "url": "http://www.portcullis-security.com/293.php" }, { "trust": 1.7, "url": "http://secunia.com/advisories/32728" }, { "trust": 1.6, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk36321" }, { "trust": 1.1, "url": "https://svn.wald.intevation.org/svn/openvas/trunk/openvas-plugins/scripts/checkpoint-vpn1-pat-information-disclosure.nasl" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46645" }, { "trust": 0.9, "url": "http://secunia.com/advisories/32728/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5849" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5849" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/46645" }, { "trust": 0.3, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk36321\u0026js_peid=p-114a7ba5fd7-10001\u0026partition=null\u0026product=vpn-1" }, { "trust": 0.3, "url": "http://www.checkpoint.com" }, { "trust": 0.1, "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026amp;solutionid=sk36321" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/13346/" }, { "trust": 0.1, "url": "http://www.portcullis.co.uk/293.php" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/6010/" }, { "trust": 0.1, "url": "https://supportcenter.checkpoint.com/supportcenter/index.jsp" }, { "trust": 0.1, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/13348/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-35974" }, { "db": "BID", "id": "32306" }, { "db": "JVNDB", "id": "JVNDB-2008-002165" }, { "db": "PACKETSTORM", "id": "72178" }, { "db": "CNNVD", "id": "CNNVD-200901-038" }, { "db": "NVD", "id": "CVE-2008-5849" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-35974" }, { "db": "BID", "id": "32306" }, { "db": "JVNDB", "id": "JVNDB-2008-002165" }, { "db": "PACKETSTORM", "id": "72178" }, { "db": "CNNVD", "id": "CNNVD-200901-038" }, { "db": "NVD", "id": "CVE-2008-5849" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-01-06T00:00:00", "db": "VULHUB", "id": "VHN-35974" }, { "date": "2008-11-14T00:00:00", "db": "BID", "id": "32306" }, { "date": "2009-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-002165" }, { "date": "2008-11-21T16:47:01", "db": "PACKETSTORM", "id": "72178" }, { "date": "2008-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200901-038" }, { "date": "2009-01-06T17:30:00.297000", "db": "NVD", "id": "CVE-2008-5849" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-35974" }, { "date": "2009-01-07T20:22:00", "db": "BID", "id": "32306" }, { "date": "2009-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-002165" }, { "date": "2009-05-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200901-038" }, { "date": "2024-11-21T00:55:01.930000", "db": "NVD", "id": "CVE-2008-5849" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200901-038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Check Point VPN-1 Intranet IP Address disclosure vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-002165" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-200901-038" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.