First published: Tue Jan 06 2009(Updated: )
Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point VPN-1 | =r55 | |
Check Point VPN-1 | =r65 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5849 is considered a medium severity vulnerability.
CVE-2008-5849 allows remote attackers to potentially discover intranet IP addresses, undermining network security.
CVE-2008-5849 affects Check Point VPN-1 versions R55, R65, and possibly other versions using Port Address Translation.
Mitigation for CVE-2008-5849 includes upgrading to a patched version of Check Point VPN-1 that addresses this vulnerability.
CVE-2008-5849 is an isolated vulnerability but highlights the risks associated with improper handling of packet transmission and address translation.