[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2005-4093Date: (C)2005-12-08   (M)2023-12-22


Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.5
Exploit Score: 8.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: SINGLE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECTRACK-1015326
BID-15757
SECUNIA-17837
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html
SECUNIA-23395
ADV-2005-2808
DSA-1237
http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html
http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html

CPE    3
cpe:/a:checkpoint:vpn-1_secureclient:4.0
cpe:/a:checkpoint:vpn-1_secureclient:4.1
cpe:/a:checkpoint:secureclient_ng:r56
CWE    1
CWE-264

© SecPod Technologies