Check Point Software Technologies Information for VU#800113

Multiple DNS implementations vulnerable to cache poisoning

Status

Not Affected

Vendor Statement

Check Point products are not vulnerable to this attack for the following reasons:

  • Check Point products do not implement DNS server functionality.
  • Check Point client applications always use server authentication, when a connection is established.
Full response may be found in SecureKnowledge entry sk35484 (https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk35484).

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

None

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.