what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

Check Point Firewall-1 Overflow
Posted Mar 30, 2009
Authored by BugsNotHugs

The Check Point Firewall-1 PKI Web Service, running by default on TCP port 18264, is vulnerable to a remote overflow in the handling of very long HTTP headers. This was discovered during a pen-test where the client would not allow further analysis and would not provide the full product/version info. Initial testing indicates the 'Authorization' and 'Referer' headers were vulnerable.

tags | exploit, remote, web, overflow, tcp
SHA-256 | ea492653b5ddebab2e708e8a2df04435b7732133b138456f88f95f23c8ba7185
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close