Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (VPN)  >   FireWall-1/VPN-1 Vendors:   Check Point
Check Point VPN-1 Address Translation Function Discloses Internal IP Addresses to Remote Users
SecurityTracker Alert ID:  1021273
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Nov 21 2008
Impact:   Disclosure of system information
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): R65
Description:   A vulnerability was reported in Check Point VPN-1. A remote user can determine internal IP addresses.

A remote user can send specially crafted packets to ports on the target system that are mapped using port address translation (PAT) to ports on an internal system to obtain information about the internal network. Packets with a low time-to-live (TTL) value sent to a mapped port will cause the target VPN-1 system to return the internal system's actual IP address within an ICMP error message.

Because TCP port 18264 is typically configured to be mapped to the VPN-1 management server, a remote user can determine the management server's internal IP address.

The vendor was notified on September 11, 2008.

Tim Brown and Mark Lowe of Portcullis Computer Security Ltd. reported this vulnerability.

The original advisory is available at:

Impact:   A remote user can determine internal IP addresses.
Solution:   The vendor plans to issued a HotFix within a few days.

A workaround is described in the vendor's advisory.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC