search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Check Point Firewall rules may improperly handle network traffic

Vulnerability Note VU#508209

Original Release Date: 2005-09-16 | Last Revised: 2005-09-27

Overview

Check Point Firewall CIFS service group may allow unintended traffic to pass through the firewall.

Description

Check Point Firewall contains a set of predefined service groups designed to handle different types of traffic associated with a service or collection of protocols. For instance, Check Point firewalls contain a predefined collection of rules to handle traffic associated with the Common Internet File System (CIFS), known as the CIFS service group.

A flaw in CIFS service group implementation may cause traffic not designated as part of the CIFS service group to be handled in an unintended manner. Depending on the configuration of the rules in place, the firewall may allow unintended traffic to pass through the firewall or drop legitimate traffic at the firewall.

Impact

Under certain configurations, arbitrary packets may pass through the firewall. This may allow access to hosts that would normally be protected behind the firewall boundary. Additionally, in other configurations, this issue may cause the firewall to deny all traffic.

Solution

Check Point suggests changing the name of the CIFS service group to mitigate this issue. For more detailed information on this workaround, please refer to Check Point SecureKnowledge database article SK31196.

Vendor Information

508209
 

Check Point Software Technologies Affected

Notified:  September 13, 2005 Updated: September 19, 2005

Status

Affected

Vendor Statement

For more detailed information on this issue, please refer to Check Point SecureKnowledge database article SK31196 on:.

http://secureknowledge.us.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?id=sk31196

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly reported by fitz.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-2889
Severity Metric: 4.39
Date Public: 2005-09-07
Date First Published: 2005-09-16
Date Last Updated: 2005-09-27 19:41 UTC
Document Revision: 68

Sponsored by CISA.