First published: Tue Sep 14 2004(Updated: )
Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote attackers to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =4.1-sp6 | |
Check Point VPN-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0699 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2004-0699, apply the latest security patches provided by Check Point for affected VPN-1 and FireWall-1 products.
CVE-2004-0699 affects Check Point FireWall-1 version 4.1-sp6 and various versions of Check Point VPN-1.
CVE-2004-0699 enables remote attackers to execute arbitrary code through a crafted IKE packet during an IKE negotiation.
The exploit method for CVE-2004-0699 involves sending malformed ASN.1 data during Aggressive Mode IKE negotiations.