First published: Fri May 14 2004(Updated: )
Buffer overflow in the ISAKMP functionality for Check Point VPN-1 and FireWall-1 NG products, before VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410 and NG FP3 HFA-325, or VPN-1 SecuRemote/SecureClient R56, may allow remote attackers to execute arbitrary code during VPN tunnel negotiation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
checkpoint next generation | ||
Check Point VPN-1 | =vsx_ng_with_application_intelligence | |
Check Point VPN-1 | =vsx_2.0.1 | |
Checkpoint NG-AI | =r54 | |
Check Point FireWall-1 | =2.0 | |
Checkpoint NG-AI | =r55 | |
Check Point FireWall-1 | ||
Check Point FireWall-1 | =2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0469 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2004-0469, upgrade to the patched versions: VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410, NG FP3 HFA-325, or VPN-1 SecuRemote/SecureClient R56.
CVE-2004-0469 affects users of Check Point VPN-1 and FireWall-1 products prior to the specified updates.
CVE-2004-0469 exploits a buffer overflow vulnerability during VPN tunnel negotiation.
Yes, if exploited, CVE-2004-0469 could allow remote attackers to execute arbitrary code, potentially resulting in data breaches.