Lucene search

K
cve[email protected]CVE-2008-5849
HistoryJan 06, 2009 - 5:30 p.m.

CVE-2008-5849

2009-01-0617:30:00
CWE-200
web.nvd.nist.gov
74
cve-2008-5849
check point vpn-1
r55
r65
pat
remote attackers
intranet ip addresses
icmp_timxceed_intrans
icmp time exceeded in-transit
tcp packet
firewall management server
port 18264

6.8 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

79.7%

Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264.

Affected configurations

NVD
Node
checkpointvpn-1Matchr55
OR
checkpointvpn-1Matchr65

6.8 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

79.7%