ID CVE-2004-0699
Summary Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote attackers to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data.
References
Vulnerable Configurations
  • cpe:2.3:a:checkpoint:firewall-1:4.1:sp6:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:firewall-1:4.1:sp6:*:*:*:*:*:*
  • cpe:2.3:a:checkpoint:vpn-1:*:*:*:*:*:*:*:*
    cpe:2.3:a:checkpoint:vpn-1:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 10820
cert-vn VU#435358
ciac O-190
confirm http://www.checkpoint.com/techsupport/alerts/asn1.html
iss 20040728 Check Point VPN-1 ASN.1 Decoding Remote Compromise
osvdb 8290
sectrack 1010799
secunia 12177
xf vpn1-asn1-decoding-bo(16824)
Last major update 11-07-2017 - 01:30
Published 28-09-2004 - 04:00
Last modified 11-07-2017 - 01:30
Back to Top