First published: Sat Sep 06 2003(Updated: )
Check Point FireWall-1 4.0 and 4.1 before SP5 allows remote attackers to obtain the IP addresses of internal interfaces via certain SecuRemote requests to TCP ports 256 or 264, which leaks the IP addresses in a reply packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =4.0 | |
Check Point FireWall-1 | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0757 is considered a medium severity vulnerability due to its potential to leak sensitive IP information.
To fix CVE-2003-0757, upgrade Check Point FireWall-1 to version 4.1 with service pack 5 or later.
CVE-2003-0757 affects Check Point FireWall-1 versions 4.0 and 4.1 prior to service pack 5.
CVE-2003-0757 leaks the IP addresses of internal interfaces in response to specific SecuRemote requests.
Yes, CVE-2003-0757 can be exploited by remote attackers, making it a significant concern for network security.