COMMAND

    FW-1

SYSTEMS AFFECTED

    Check Point Firewall-1 on Windows NT

PROBLEM

    Following  is  based  on  a  FSC  Internet  Corp./SecureXpert Labs
    Advisory.   The  SMTP  Security  Server  component  of Check Point
    Firewall-1 4.0  and 4.1  is vulnerable  to a  simple network-based
    attack which raises the firewall load to 100%.

    Check  Point  Firewall-1  includes  a  component  called  the SMTP
    Security Server.   This is  an SMTP  proxy, the  use of  which  is
    required  by   several  of   Firewall-1's  advanced   SMTP   email
    processing capabilities,  including CVP-based  virus scanning  and
    URI filtering.

    The Check Point Firewall-1 SMTP Security Server in Firewall-1  4.0
    and 4.1  on Windows  NT is  vulnerable to  a simple  network-based
    attack which can increase the firewall's CPU utilization to 100%.

    Sending a stream of binary zeros over the network to the SMTP port
    on the  firewall raises  the target  system's load  to 100%  while
    the load on the attacker's system machine remains relatively  low.
    This can  easily be  reproduced from  a Linux  system using netcat
    with an input of /dev/zero, with a command such as

        nc firewall 25 < /dev/zero

    This vulnerability could allow  a very quick and  easy distributed
    attack on Check Point Firewall-1.

SOLUTION

    Check  Point  Software  Technologies  has  been  informed  of this
    vulnerability, and has  assigned it incident  ID# TT44913.   As of
    June  20,  2000  Check  Point  has  stated  that  a  fix  for this
    vulnerability will NOT  be included in  Service Pack 2  (SP-2) for
    Check Point firewall-1 4.1, but  it will "probably be included  in
    SP-3".