Check Point FireWall-1 UDP Port 0 DoS

high Nessus Plugin ID 10074

Synopsis

The remote firewall has a denial of service vulnerability.

Description

It was possible to crash either the remote host or the firewall in between us and the remote host by sending an UDP packet going to port 0.

This flaw may allow an attacker to shut down your network.

Solution

Contact your firewall vendor if it was the firewall which crashed, or filter incoming UDP traffic if the remote host crashed.

See Also

https://seclists.org/bugtraq/1999/Aug/94

Plugin Details

Severity: High

ID: 10074

File Name: firewall1_dos.nasl

Version: 1.31

Type: remote

Family: Firewalls

Published: 8/20/1999

Updated: 3/6/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 8/9/1999

Reference Information

CVE: CVE-1999-0675

BID: 576