First published: Mon Mar 26 2001(Updated: )
FireWall-1 4.1 with a limited-IP license allows remote attackers to cause a denial of service by sending a large number of spoofed IP packets with various source addresses to the inside interface, which floods the console with warning messages and consumes CPU resources.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =4.1 | |
Check Point FireWall-1 | =4.1-sp2 | |
Check Point FireWall-1 | =4.1-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0182 is classified as a denial of service vulnerability with a moderate severity level.
To fix CVE-2001-0182, update your Check Point FireWall-1 software to a version that addresses this vulnerability.
An attacker can exploit CVE-2001-0182 to flood the firewall's console with warning messages, resulting in significant CPU resource consumption.
CVE-2001-0182 affects Check Point FireWall-1 versions 4.1, 4.1-sp2, and 4.1-sp3.
A possible workaround for CVE-2001-0182 is to limit the number of IP packets reaching the firewall through network configuration changes.