Vulnerability Description
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Checkpoint | Firewall-1 | 4.1 |
References
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0128.htmlPatchVendor Advisory
- http://ciac.llnl.gov/ciac/bulletins/l-109.shtml
- http://online.securityfocus.com/cgi-bin/archive.pl?id=1&start=2002-03-11&end=200
- http://www.cert.org/advisories/CA-2001-17.htmlUS Government Resource
- http://www.checkpoint.com/techsupport/alerts/rdp.html
- http://www.kb.cert.org/vuls/id/310295US Government Resource
- http://www.osvdb.org/1884
- http://www.securityfocus.com/bid/2952PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6815
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0128.htmlPatchVendor Advisory
- http://ciac.llnl.gov/ciac/bulletins/l-109.shtml
- http://online.securityfocus.com/cgi-bin/archive.pl?id=1&start=2002-03-11&end=200
- http://www.cert.org/advisories/CA-2001-17.htmlUS Government Resource
- http://www.checkpoint.com/techsupport/alerts/rdp.html
- http://www.kb.cert.org/vuls/id/310295US Government Resource
FAQ
What is CVE-2001-1158?
CVE-2001-1158 is a vulnerability with a CVSS score of 7.5 (HIGH). Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP ...
How severe is CVE-2001-1158?
CVE-2001-1158 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1158?
Check the references section above for vendor advisories and patch information. Affected products include: Checkpoint Firewall-1.