First published: Mon Jul 09 2001(Updated: )
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =4.1 | |
Check Point FireWall-1 | =4.1-sp2 | |
Check Point FireWall-1 | =4.1_build_41439 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1158 is considered a critical vulnerability due to its potential to allow remote attackers to bypass firewall restrictions.
To fix CVE-2001-1158, it is recommended to upgrade to the patched version of Check Point FireWall-1 that addresses this vulnerability.
CVE-2001-1158 affects version 4.1 and version 4.1 with service pack 2 of Check Point FireWall-1.
An attacker can use forged RDP headers to bypass intended restrictions on UDP port 259 of arbitrary hosts due to CVE-2001-1158.
There are no effective workarounds for CVE-2001-1158, so upgrading the software is the recommended solution.