Check Point VPN-1 SecureClient 4.0 4.1 - Policy Bypass

2005-12-07T00:00:00
ID EXPLOITPACK:23F5394C7657C4591874E63FA913D080
Type exploitpack
Reporter Viktor Steinmann
Modified 2005-12-07T00:00:00

Description

Check Point VPN-1 SecureClient 4.0 4.1 - Policy Bypass

                                        
                                            source: https://www.securityfocus.com/bid/15757/info

VPN-1 SecureClient is reported prone to a policy bypass vulnerability. This issue is due to a failure of the application to securely implement remote administrator-provided policies on affected computers.

This issue allows remote VPN users to bypass the administratively-defined security policies. Specific issues arising from this vulnerability depend on the intended policies defined by administrators. Some examples of the consequences are: unauthorized computers may connect, scripts may not execute, or insecure network configurations may be possible. 

:Loop
copy x.scv local.scv
goto Loop