Vulnerability CVE-2005-4093


Published: 2005-12-08   Modified: 2012-02-12

Description:
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Checkpoint -> Secureclient ng 
Checkpoint -> Vpn-1 secureclient 

 References:
http://www.vupen.com/english/advisories/2005/2808
http://www.us.debian.org/security/2006/dsa-1237
http://www.securityfocus.com/bid/15757
http://www.mail-archive.com/swinog@lists.swinog.ch/msg00799.html
http://www.mail-archive.com/swinog@lists.swinog.ch/msg00798.html
http://securitytracker.com/id?1015326
http://secunia.com/advisories/23395
http://secunia.com/advisories/17837
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html

Copyright 2024, cxsecurity.com

 

Back to Top