COMMAND
FW-1
SYSTEMS AFFECTED
Firewall-1
PROBLEM
Hugo Vasquez found following. If you flood port 264 (FW1_topo)
from your local network, the Firewall-1 CPU reaches 100% and
nobody can connect with GUI (neither on the firewall itself).
The test has been done on a local 10 MB Ethernet against a PII 266
256 MB, FW1 4.1 SP1 in a NT 4.0 SP4 with the ippacket software
and spoofing the source IP, and that's the packet sent:
destination IP : Firewall (external interface)
source IP : non existent IP (on local net)
source port : 1000
destination port : 264
data : qwertyuiop1010101010
number of packets: -1 (continuos mode)
Due to the importance of this port (264) in Securemote, etc...
Hugo thinks it would be interesting to investigate how much this
attack could danger the system ( memory ) and comunications (smtp,
VPN , Securemote...).
SOLUTION
This is effectively a misconfiguration issue, although it is the
default configuration upon initial install. This is not a bug
because the first thing the "wizard" does for you is to block all
traffic directly to the firewall, this should not be an issue for
most people. This is a really good thing, because FW-1 listens
on an obscene number of ports in a default installation.
Check Point after extensive testing was unable to reproduce this
vulnerability. This testing was done both with and without IP
Spoofing protection enabled, with the provided source code and
other tools. At this time, Check Point does not believe this is
an actual vulnerability.