Full Disclosure mailing list archives
Re: Buffer Overflow in ISAKMP-Process at Checkpoint VPN-1 (the VPN component commonly deployed on Checkpoint Firewall-1 installations)
From: Jeremiah Cornelius <jeremiah () nur net>
Date: Thu, 5 Feb 2004 08:28:08 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thursday 05 February 2004 02:58, Olaf Hahn wrote:
There is no effective workaround for this vulnerability. Upgrading to the NG versions of VPN-1 Server and SecureRemote/Client will remove this vulnerability. Checkpoint no longer supports the versions of VPN-1 and SecureRemote/ SecureClient affected by this vulnerability. Checkpoint recommends that all affected users upgrade to Firewall-1 NG FP1 or greater.
The rest of the known world recommends upgrading to Netscreen. In related news, Ford Motors is no longer supporting the 1997 Taurus, and Airbus says those still flying pre -1989 A300s are on their own for sourcing parts and maintenance. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAIm8YJi2cv3XsiSARAjcNAJ0RK7tjJVH+yzmW4lSLI0lrGFY0kQCgkMOT Ewk0VqMm+7rLnqPZk/PXBQ0= =eLid -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Buffer Overflow in ISAKMP-Process at Checkpoint VPN-1 (the VPN component commonly deployed on Checkpoint Firewall-1 installations) Olaf Hahn (Feb 05)
- Re: Buffer Overflow in ISAKMP-Process at Checkpoint VPN-1 (the VPN component commonly deployed on Checkpoint Firewall-1 installations) Jeremiah Cornelius (Feb 05)