CVE-2008-5849 Information

Share on:

Description

Check Point VPN-1 R55 R65 and other versions when Port Address Translation (PAT) is used allows remote attackers to discover intranet IP addresses via a packet with a small TTL which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address as demonstrated by a TCP packet to the firewall management server on port 18264.

Reference

http://secunia.com/advisories/32728 http://www.portcullis-security.com/293.php http://www.securityfocus.com/bid/32306 http://www.vupen.com/english/advisories/2008/3229 https://exchange.xforce.ibmcloud.com/vulnerabilities/46645 https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk36321 https://svn.wald.intevation.org/svn/openvas/trunk/openvas-plugins/scripts/checkpoint-vpn1-pat-information-disclosure.nasl