CVE-2009-1227

Checkpoint Firewall-1 Pki Web Service - Memory Corruption

Title source: rule
STIX 2.1

Description

NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service in Check Point Firewall-1 PKI Web Service allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) Authorization or (2) Referer HTTP header to TCP port 18624. NOTE: the vendor has disputed this issue, stating "Check Point Security Alert Team has analyzed this report. We've tried to reproduce the attack on all VPN-1 versions from NG FP2 and above with and without HFAs. The issue was not reproduced. We have conducted a thorough analysis of the relevant code and verified that we are secure against this attack. We consider this attack to pose no risk to Check Point customers." In addition, the original researcher, whose reliability is unknown as of 20090407, also states that the issue "was discovered during a pen-test where the client would not allow further analysis.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Bugs NotHugs · textdoshardware
https://www.exploit-db.com/exploits/8313

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/502256/100/0/threaded
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/8313
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/34286
Exploit vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1021948

Scores

EPSS 0.1697
EPSS Percentile 95.0%

Details

CWE
CWE-119
Status published
Products (1)
checkpoint/firewall-1_pki_web_service
Published Apr 02, 2009
Tracked Since Feb 18, 2026