Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote malicious users to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
checkpoint firewall-1 4.0 |
||
checkpoint firewall-1 4.1 |
||
checkpoint firewall-1 3.0 |