First published: Fri Sep 21 2001(Updated: )
Buffer overflow in the GUI authentication code of Check Point VPN-1/FireWall-1 Management Server 4.0 and 4.1 allows remote attackers to execute arbitrary code via a long user name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =4.0 | |
Check Point FireWall-1 | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0940 is classified as critical due to its potential for allowing arbitrary code execution through a buffer overflow.
To fix CVE-2001-0940, you should upgrade to a patched version of Check Point VPN-1/FireWall-1 management software.
CVE-2001-0940 affects Check Point FireWall-1 versions 4.0 and 4.1.
Any organization using Check Point FireWall-1 versions 4.0 or 4.1 is at risk from CVE-2001-0940.
CVE-2001-0940 is a buffer overflow vulnerability that can be exploited via the GUI authentication code.