lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: jeremiah at nur.net (Jeremiah Cornelius)
Subject: Buffer Overflow in ISAKMP-Process at Checkpoint VPN-1 (the VPN component commonly deployed on Checkpoint Firewall-1 installations)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thursday 05 February 2004 02:58, Olaf Hahn wrote:
> There is no effective workaround for this vulnerability. Upgrading to the
> NG versions of VPN-1 Server and SecureRemote/Client will remove this
> vulnerability.
>
> Checkpoint no longer supports the versions of VPN-1 and SecureRemote/
> SecureClient affected by this vulnerability. Checkpoint recommends that
> all affected users upgrade to Firewall-1 NG FP1 or greater.

The rest of the known world recommends upgrading to Netscreen.

In related news, Ford Motors is no longer supporting the 1997 Taurus, and 
Airbus says those still flying pre -1989 A300s are on their own for sourcing 
parts and maintenance.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAIm8YJi2cv3XsiSARAjcNAJ0RK7tjJVH+yzmW4lSLI0lrGFY0kQCgkMOT
Ewk0VqMm+7rLnqPZk/PXBQ0=
=eLid
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ