CVE-2005-4093
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-264
Permisos, privilegios y/o control de acceso
Fecha de publicación:
08/12/2005
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.
Impacto
Puntuación base 2.0
6.50
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:checkpoint:secureclient_ng:*:*:fp1:*:*:*:*:* | ||
cpe:2.3:a:checkpoint:secureclient_ng:r56:*:*:*:*:*:*:* | ||
cpe:2.3:a:checkpoint:vpn-1_secureclient:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:checkpoint:vpn-1_secureclient:4.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html
- http://secunia.com/advisories/17837
- http://secunia.com/advisories/23395
- http://securitytracker.com/id?1015326=
- http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html
- http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html
- http://www.securityfocus.com/bid/15757
- http://www.us.debian.org/security/2006/dsa-1237
- http://www.vupen.com/english/advisories/2005/2808
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html
- http://secunia.com/advisories/17837
- http://secunia.com/advisories/23395
- http://securitytracker.com/id?1015326=
- http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html
- http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html
- http://www.securityfocus.com/bid/15757
- http://www.us.debian.org/security/2006/dsa-1237
- http://www.vupen.com/english/advisories/2005/2808