First published: Sat Sep 08 2001(Updated: )
The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =3.0 | |
Check Point FireWall-1 | =4.0 | |
Check Point FireWall-1 | =4.1 | |
Check Point FireWall-1 | =4.1-sp1 | |
Check Point FireWall-1 | =4.1-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1101 has a moderate severity rating due to the potential for arbitrary file overwriting by authenticated users.
To fix CVE-2001-1101, update your Check Point FireWall-1 software to a version that is not affected by this vulnerability.
CVE-2001-1101 affects users of Check Point FireWall-1 versions 3.0 through 4.1 SP2.
CVE-2001-1101 can be exploited by remote authenticated users, allowing them to overwrite log files.
CVE-2001-1101 affects systems running the Check Point FireWall-1 GUI on Solaris platforms.