Full Disclosure mailing list archives

Re: Buffer Overflow in ISAKMP-Process at Checkpoint VPN-1 (the VPN component commonly deployed on Checkpoint Firewall-1 installations)


From: Jeremiah Cornelius <jeremiah () nur net>
Date: Thu, 5 Feb 2004 08:28:08 -0800

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thursday 05 February 2004 02:58, Olaf Hahn wrote:
There is no effective workaround for this vulnerability. Upgrading to the
NG versions of VPN-1 Server and SecureRemote/Client will remove this
vulnerability.

Checkpoint no longer supports the versions of VPN-1 and SecureRemote/
SecureClient affected by this vulnerability. Checkpoint recommends that
all affected users upgrade to Firewall-1 NG FP1 or greater.

The rest of the known world recommends upgrading to Netscreen.

In related news, Ford Motors is no longer supporting the 1997 Taurus, and 
Airbus says those still flying pre -1989 A300s are on their own for sourcing 
parts and maintenance.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAIm8YJi2cv3XsiSARAjcNAJ0RK7tjJVH+yzmW4lSLI0lrGFY0kQCgkMOT
Ewk0VqMm+7rLnqPZk/PXBQ0=
=eLid
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: