Check Point FireWall-1/VPN-1 Syslog Daemon Remote Overflow DoS

Medium Nessus Plugin ID 11613


The remote syslog service has a denial of service vulnerability.


The remote host is running a syslog server (most likely a Check Point NG syslog server) with a denial of service vulnerability. A remote, attacker could exploit this to crash this server. It is not known whether or not this vulnerability could result in arbitrary code execution.

Please note Nessus crashed the service while performing this check.


Upgrade to NG FP3 HF2.

See Also

Plugin Details

Severity: Medium

ID: 11613

File Name: cp_syslog_overflow.nasl

Version: $Revision: 1.22 $

Type: remote

Family: Firewalls

Published: 2003/05/09

Modified: 2014/05/25

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:U/RC:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2003/03/13

Vulnerability Publication Date: 2003/03/21

Reference Information

BID: 7159

OSVDB: 1017