First published: Fri Oct 13 2000(Updated: )
Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote attackers to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =3.0 | |
Check Point FireWall-1 | =4.0 | |
Check Point FireWall-1 | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0779 is considered a high-severity vulnerability due to its potential to allow unauthorized remote access.
To fix CVE-2000-0779, disable the RSH/REXEC settings in the Checkpoint Firewall-1 configuration.
CVE-2000-0779 affects Check Point Firewall-1 versions 3.0, 4.0, and 4.1.
Yes, CVE-2000-0779 can be exploited remotely by sending malformed connection requests.
CVE-2000-0779 compromises network security by allowing attackers to bypass access restrictions.