First published: Wed Jan 18 2006(Updated: )
Unquoted Windows search path vulnerability in Check Point VPN-1 SecureClient might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run when SecureClient attempts to launch the Sr_GUI.exe program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point VPN-1 | =4.1-sp6 | |
Check Point VPN-1 | =4.1 | |
Check Point VPN-1 | =4.1-sp3 | |
Check Point VPN-1 | =4.1-sp4 | |
Check Point VPN-1 | =4.1-sp1 | |
Check Point VPN-1 | =4.1-sp5 | |
Check Point VPN-1 | ||
Check Point VPN-1 | =4.1-sp5a | |
Check Point VPN-1 | =4.1-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0255 is considered a high-severity vulnerability that can allow privilege escalation for local users.
To fix CVE-2006-0255, ensure that the installation path of Check Point VPN-1 SecureClient does not contain unquoted paths and update to the latest security patches provided by Check Point.
CVE-2006-0255 affects multiple versions of the Check Point VPN-1 SecureClient, including version 4.1 and its various service packs.
CVE-2006-0255 can be exploited by local users who have access to the system where Check Point VPN-1 SecureClient is installed.
Exploiting CVE-2006-0255 could allow an attacker to run arbitrary code with higher privileges, leading to a complete compromise of the affected system.