Spanish security firm Pentest has discovered 10 buffer overflows affecting different applications in Check Point's flagship FireWall-1 security software.
The multiple buffer overflow vulnerabilities were uncovered by Pentest in a comprehensive security evaluation of the most secure version of FireWall-1/VPN-1, the Secure Platform R60. Experts were only able to exploit the vulnerabilities locally, though they did not exclude the potential for remote exploitation.
Checkpoint has confirmed (knowledge base for registered customers) the problem for all of the versions of its products based on SecuredPlatform but emphasises that the vulnerabilities can only be exploited under very special conditions. For instance, privileges can only be escalated if the attacker already is an administrator with access to the expert shell. In its security advisory for the flaws, the vendor says that an updated version of Tools SDSUtil will be made available to customers via Checkpoint's support. Furthermore, the firm says it is working on a more comprehensive remedy and hopes to have a fix for VPN-1 NGX by the end of the month.
- Check Point Secure Platform Multiple Buffer Overflows (Posting by Hugo Vázquez Caramés)
- Check Point Secure Platform Hack (Analysis by Pentest, PDF)
Related Topics:Security Software CXO Hardware Mobility Data Centers Cloud
Paul Mah is a writer and blogger who lives in Singapore, where he has worked for a number of years in various capacities within the IT industry. Paul enjoys tinkering with tech gadgets, smartphones, and networking devices.