Vulnerability Description
Format string vulnerability in Check Point VPN-1/FireWall-1 4.1 allows a remote authenticated firewall administrator to execute arbitrary code via format strings in the control connection.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Checkpoint | Firewall-1 | 4.1 |
| Checkpoint | Provider-1 | 4.1 |
| Checkpoint | Vpn-1 | 4.1 |
References
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0209.htmlPatchVendor Advisory
- http://www.checkpoint.com/techsupport/alerts/format_strings.html
- http://www.osvdb.org/1901
- http://www.securityfocus.com/bid/3021PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6849
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0209.htmlPatchVendor Advisory
- http://www.checkpoint.com/techsupport/alerts/format_strings.html
- http://www.osvdb.org/1901
- http://www.securityfocus.com/bid/3021PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6849
FAQ
What is CVE-2001-1176?
CVE-2001-1176 is a vulnerability with a CVSS score of 7.5 (HIGH). Format string vulnerability in Check Point VPN-1/FireWall-1 4.1 allows a remote authenticated firewall administrator to execute arbitrary code via format strings in the control connection.
How severe is CVE-2001-1176?
CVE-2001-1176 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1176?
Check the references section above for vendor advisories and patch information. Affected products include: Checkpoint Firewall-1, Checkpoint Provider-1, Checkpoint Vpn-1.