Check Point FireWall-1/VPN-1 Syslog Daemon Remote Overflow DoS

medium Nessus Plugin ID 11613

Language:

Synopsis

The remote syslog service has a denial of service vulnerability.

Description

The remote host is running a syslog server (most likely a Check Point NG syslog server) with a denial of service vulnerability. A remote, attacker could exploit this to crash this server. It is not known whether or not this vulnerability could result in arbitrary code execution.

Please note Nessus crashed the service while performing this check.

Solution

Upgrade to NG FP3 HF2.

See Also

http://www.nessus.org/u?828959b8

http://www.nessus.org/u?52cfe65e

Plugin Details

Severity: Medium

ID: 11613

File Name: cp_syslog_overflow.nasl

Version: 1.24

Type: remote

Family: Firewalls

Published: 5/9/2003

Updated: 3/6/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 3/13/2003

Vulnerability Publication Date: 3/21/2003

Reference Information

BID: 7159