First published: Sat Mar 11 2000(Updated: )
Firewall-1 3.0 and 4.0 leaks packets with private IP address information, which could allow remote attackers to determine the real IP address of the host that is making the connection.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =3.0 | |
Check Point FireWall-1 | =4.0 | |
Check Point FireWall-1 | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0181 is considered a moderate severity vulnerability due to the potential for information leakage.
To mitigate the effects of CVE-2000-0181, upgrade to a fixed version of Check Point FireWall-1, such as version 4.1 or later.
CVE-2000-0181 affects Check Point FireWall-1 versions 3.0, 4.0, and earlier configurations.
The impact of CVE-2000-0181 allows remote attackers to infer the real IP address of a host, potentially exposing the network to further attacks.
Yes, CVE-2000-0181 can be exploited remotely, making it essential for affected users to apply fixes promptly.