Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264.
Advisories
Source ID Title
EUVD EUVD EUVD-2008-5819 Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T11:04:44.697Z

Reserved: 2009-01-06T00:00:00

Link: CVE-2008-5849

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2009-01-06T17:30:00.297

Modified: 2025-04-09T00:30:58.490

Link: CVE-2008-5849

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses