Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Check Point Firewall-1 GUI Client Log Viewer Symbolic Link Vulnerability

Check Point Firewall-1 GUI Client Log Viewer Symbolic Link Vulnerability

by Majik on September 10th, 2001 Check Point Firewall-1 is a commercial firewall implementation designed for small to enterprise sized networks.




A problem with Firewall-1 makes it possible for a local user to overwrite critical system files. Firewall-1 does not check for the existance of files when saving files through the Log Viewer function. Log Viewer will overwrite files ending in the .log extension, and will following symbolic links to corrupt root-owned files.


This makes it possible for a user with administrative access to Firewall-1 and local shell access to deny service to legitimate users of the system.


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »