27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is running with version R55.<br />

There has been at least one (1) critical patch released by Checkpoint since R55. This<br />

version of Firewall-1 may be vulnerable to a myriad of remote attacks that would give the<br />

attacker the ability to impact confidentiality, integrity, and availability of the remote<br />

system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-3885<br />

Checkpoint Firewall-1 NG Patch Level 0 Detection<br />

<strong>PVS</strong> ID: 2909 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is not running any<br />

Checkpoint patches. Since the release of Firewall-1 NG, there have been at least five (5)<br />

critical patches released by Checkpoint. This version of Firewall-1 is vulnerable to a<br />

myriad of remote attacks that would give the attacker the ability to impact confidentiality,<br />

integrity, and availability of the remote system<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Checkpoint Firewall-1 NG Patch Level FP1 Detection<br />

<strong>PVS</strong> ID: 2910 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is running Checkpoint patch<br />

level FP1. Since the release of Firewall-1 NG FP1, there have been at least four (4) critical<br />

patches released by Checkpoint. This version of Firewall-1 is vulnerable to a myriad of<br />

remote attacks that would give the attacker the ability to impact confidentiality, integrity,<br />

and availability of the remote system<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Checkpoint Firewall-1 NG Patch Level FP2 Detection<br />

<strong>PVS</strong> ID: 2911 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Firewall-1 NG VPN Server. The remote server is running Checkpoint patch<br />

level FP2. Since the release of Firewall-1 NG FP2, there have been at least three (3) critical<br />

patches released by Checkpoint. This version of Firewall-1 is vulnerable to a myriad of<br />

remote attacks that would give the attacker the ability to impact confidentiality, integrity,<br />

and availability of the remote system<br />

Family Internet Services 754

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!