Vulnerability Note VU#790771

HTTP Parsing Vulnerabilities in Check Point Firewall-1

Original Release date: 05 Feb 2004 | Last revised: 23 Apr 2004


Several versions of Check Point Firewall-1 contain a vulnerability that allows remote attackers to execute arbitrary code with administrative privileges.


The HTTP Security Servers component of Check Point Firewall-1 contains an HTTP parsing vulnerability that is triggered by sending an invalid HTTP request through the firewall. When Firewall-1 generates an error message in response to the invalid request, a portion of the input supplied by the attacker is included in the format string for a call to sprintf().

Researchers at Internet Security Systems have determined that it is possible to exploit this format string vulnerability to execute commands on the firewall. The researchers have also determined that this vulnerability can be exploited as a heap overflow, which would allow an attacker to execute arbitrary code. In either case, the commands or code executed by the attacker would run with administrative privileges, typically "SYSTEM" or "root". For more information, please see the ISS advisory.


This vulnerability allows remote attackers to execute arbitrary code on affected firewalls with administrative privileges, typically "SYSTEM" or "root".


Apply the patch from Check Point

Check Point has published a "Firewall-1 HTTP Security Server Update" to address this vulnerability. For more information, please see the Check Point bulletin at:

Disable the affected components

Check Point has reported that their products are only affected by this vulnerability if the HTTP Security Servers feature is enabled. Therefore, affected sites may be able to limit their exposure to this vulnerability by disabling HTTP Security Servers.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Check PointAffected02 Feb 200406 Feb 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was discovered and researched by Mark Dowd of ISS X-Force.

This document was written by Jeffrey P. Lanza.

Other Information

  • CVE IDs: CAN-2004-0039
  • Date Public: 04 Feb 2004
  • Date First Published: 05 Feb 2004
  • Date Last Updated: 23 Apr 2004
  • Severity Metric: 17.10
  • Document Revision: 30


If you have feedback, comments, or additional information about this vulnerability, please send us email.