Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a clients PASV attempt.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firewall-1 | Checkpoint | 3.0 (including) | 3.0 (including) |
Firewall-1 | Checkpoint | 4.0 (including) | 4.0 (including) |
Pix_firewall_software | Cisco | 4.1(6) (including) | 4.1(6) (including) |
Pix_firewall_software | Cisco | 4.1(6b) (including) | 4.1(6b) (including) |
Pix_firewall_software | Cisco | 4.2(1) (including) | 4.2(1) (including) |
Pix_firewall_software | Cisco | 4.2(2) (including) | 4.2(2) (including) |
Pix_firewall_software | Cisco | 4.3 (including) | 4.3 (including) |
Pix_firewall_software | Cisco | 4.4(4) (including) | 4.4(4) (including) |
Pix_firewall_software | Cisco | 5.0 (including) | 5.0 (including) |