January 29th, 2004, 07:07 PM
Check Point Firewall security scare
Didn't see this posted yet.
Fix available. Get it
By INQUIRER staff: Thursday 29 January 2004, 11:38
HIGHLY CRITICAL errors in popular firewall software from Check Point need filling quick, according to a security bulletin from Secunia.
The alert service said there are hotfixes available for Check Point's FireWall-1 NG with AI, and the Achilles' Hell is in the implementation of the H.323 protocol.
Check Point has acknowledged the problems, said Secunia, which can cause denial of service attacks or system access from default port 1720/tcp.
26 January 2004
A recent NISCC advisory reveals vulnerabilities in H.323 equipment including GateKeepers, endpoints (phones, softphones, video cameras, etc.), and firewalls that enforce H.323 security.
In order to protect FireWall-1 against the attacks described in this advisory, Check Point recommends that customers install an update on all enforcement modules.
The update is available for Software Subscription customers from the links below. Check Point also encourages you to contact your H.323 equipment vendors (especially GateKeeper) for any related updates.
is a firefox extension that gives you stats on how long you have quit smoking, how much money you\'ve saved, how much you haven\'t smoked and recent milestones. Very helpful for people who quit smoking and used to smoke at their computers... Helps out with the urges.
January 30th, 2004, 12:30 AM
Flaw in the protocol
The flaw seems to be in the H.323 protocol itself:
Get the full writeup on CERT's website
Original release date: January 13, 2004
Last revised: January 15, 2004
Source: CERT/CC, NISCC
A complete revision history can be found at the end of this file.
Many software and hardware systems that implement the H.323 protocol
* Voice over Internet Protocol (VoIP) devices and software
* Video conferencing equipment and software
* Session Initiation Protocol (SIP) devices and software
* Media Gateway Control Protocol (MGCP) devices and software
* Other networking equipment that may process H.323 traffic (e.g., routers and firewalls)
A number of vulnerabilities have been discovered in various implementations of the multimedia telephony protocol H.323. Voice over Internet Protocol (VoIP) and video conferencing equipment and software can use these protocols to communicate over a variety of computer networks.