Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote attackers to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firewall-1 | Checkpoint | 3.0 (including) | 3.0 (including) |
Firewall-1 | Checkpoint | 4.0 (including) | 4.0 (including) |
Firewall-1 | Checkpoint | 4.1 (including) | 4.1 (including) |