First published: Thu Jul 12 2001(Updated: )
Format string vulnerability in Check Point VPN-1/FireWall-1 4.1 allows a remote authenticated firewall administrator to execute arbitrary code via format strings in the control connection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =4.1 | |
Check Point FireWall-1 | =4.1-sp1 | |
Check Point FireWall-1 | =4.1-sp2 | |
Check Point FireWall-1 | =4.1-sp3 | |
Checkpoint Multi-domain Management / Provider-1 | =4.1 | |
Checkpoint Multi-domain Management / Provider-1 | =4.1-sp1 | |
Checkpoint Multi-domain Management / Provider-1 | =4.1-sp2 | |
Checkpoint Multi-domain Management / Provider-1 | =4.1-sp3 | |
Check Point VPN-1 | =4.1 | |
Check Point VPN-1 | =4.1-sp1 | |
Check Point VPN-1 | =4.1-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1176 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2001-1176, it is recommended to upgrade to the latest patched version of Check Point VPN-1/FireWall-1 or apply any available security updates.
CVE-2001-1176 affects Check Point VPN-1/FireWall-1 version 4.1, including service packs 1, 2, and 3.
CVE-2001-1176 can be exploited by a remote authenticated firewall administrator to execute arbitrary code.
Exploitation of CVE-2001-1176 can lead to unauthorized remote code execution, resulting in potential full system compromise.