Nessus Plugin #10710

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

Checkpoint SecuRemote information leakage

Family:
Firewalls
Category:
infos
Copyright:
This script is Copyright (C) 2001 SecuriTeam
Summary:
Checkpoint SecuRemote information leakage
Version:
$Revision: 1.14 $
Cve_id:
CVE-2001-1303
Bugtraq_id:
3058
Xrefs:
-
Description:

The remote host seems to be a Checkpoint FireWall-1 running SecuRemote.
The SecuRemote service contains a vulnerability that allows attackers
to gain information about the hosts, networks, and users configured on
the Firewall.

This will enable attackers to focus their attack strategy.

You should not let this information leak out.

Solution:
Either block the SecuRemote's ports (TCP 256 and 264) to untrusted networks,
or upgrade to the latest version of Checkpoint's Firewall-1.

Workaround:
You could restrict the topology download, so that only authenticated
users can download it.
Go to Policy Properties Desktop Security of your Policy Editor and
uncheck 'respond to unauthenticated topology requests'.
After installing the Policy only authenticated Users can download
the Topology.

Risk factor : Medium

Reference : http://online.securityfocus.com/archive/1/197566
http://online.securityfocus.com/bid/3058

For More Information:
http://www.securiteam.com/securitynews/5HP0D2A4UC.html
Generiert am 27.04.2005 um 18:49:54 Uhr.