Total vulnerabilities in the database
Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt.
Software | From | Fixed in |
---|---|---|
checkpoint / firewall-1 | 3.0 | 3.0.x |
checkpoint / firewall-1 | 4.0 | 4.0.x |
cisco / pix_firewall_software | 4.1(6) | 4.1(6).x |
cisco / pix_firewall_software | 4.1(6b) | 4.1(6b).x |
cisco / pix_firewall_software | 4.3 | 4.3.x |
cisco / pix_firewall_software | 4.2(1) | 4.2(1).x |
cisco / pix_firewall_software | 4.4(4) | 4.4(4).x |
cisco / pix_firewall_software | 4.2(2) | 4.2(2).x |
cisco / pix_firewall_software | 5.0 | 5.0.x |