lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1083778896.40992750208f8@mail.online.ie>
From: r00t at online.ie (Mark Fagan)
Subject: Checkpoint  ISAKMP issue?

Vitor,

I think you will find the current CP vulnerability is quite a lot different to 
the vulnerability discovered in February.

Cheers

Mark

Quoting Vitor Ventura <vventura@...ce.pt>:

> I think it was in January that X-Force reported a problem with something like
> this and Checkpoint said it wasn't the report. 
> And now they prepare the patch in April 19th and only at the 5th of May the
> report the vulnerability.
> 
> Is it just me, or it seems like it was vulnerable from the beginning.
> 
> 
> -----Original Message-----
> From:	arlen [mailto:arlen@...hmail.com]
> Sent:	Wed 5/5/2004 12:47 PM
> To:	full-disclosure@...ts.netsys.com
> Cc:	
> Subject:	[Full-Disclosure] Checkpoint  ISAKMP issue?
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> hi all,
> 
> Checkpoint report a vulnerability with their VPN-1 software (which AFAIK
> means pretty much all FW-1 firewalls) in the ISAKMP code used during
> initial tunnel setup. Anyone have any more details than those on the
> Checkpoint site at http://www.checkpoint.com/techsupport/alerts/ike_vpn.html
> ?
> 
> 
> 
> r_len
> 
> -----BEGIN PGP SIGNATURE-----
> Note: This signature can be verified at https://www.hushtools.com/verify
> Version: Hush 2.4
> 
> wkYEARECAAYFAkCY1JkACgkQtd50JL6MBE+FUQCfW7PuG/xWyu0f/jPEvo3EQb9MQ0UA
> oLmYiERFctgghFOO5+9DlIAEBM0I
> =RkrI
> -----END PGP SIGNATURE-----
> 
> 
> 
> 
> Concerned about your privacy? Follow this link to get
> FREE encrypted email: https://www.hushmail.com/?l=2
> 
> Free, ultra-private instant messaging with Hush Messenger
> https://www.hushmail.com/services.php?subloc=messenger&l=434
> 
> Promote security and make money with the Hushmail Affiliate Program: 
> https://www.hushmail.com/about.php?subloc=affiliate&l=427
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ