Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   Check Point Endpoint Security Server Vendors:   Check Point
Check Point Endpoint Security On-Demand Client Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1025906
SecurityTracker URL:
CVE Reference:   CVE-2011-1827   (Links to External Site)
Updated:  Aug 13 2011
Original Entry Date:  Aug 10 2011
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Check Point Endpoint Security On-Demand. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted HTML that, when loaded by the target user, will invoke an ActiveX control or Java applet and execute arbitrary code on the target system. The code will run with the privileges of the target user.

The vendor reports that in most cases the user must override a security warning message for the code to execute.

Check Point SSL Network Extender (SNX) and SecureWorkSpace are also affected.

Check Point Security Gateways are not affected.

The CLSID for the vulnerable ActiveX control is: B4CB50E4-0309-4906-86EA-10B6641C8392

The SHA1 fingerprint of the signed certificate of the vulnerable Java applet is: F6:40:1D:7B:67:08:3C:0F:3D:2A:9F:BC:69:E2:AD:6C:A5:D6:F5:8D

The original advisory is available at:

Johannes Greil of SEC Consult Unternehmensberatung GmbH reported this vulnerability.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a hotfix.

For Windows-based users of the ActiveX control, Microsoft has issued a kill-bit as part of Microsoft Security Advisory 2562937 (August 9, 2011):

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  UNIX (macOS/OS X), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC