source: http://www.securityfocus.com/bid/12571/info VPN-1 SecureClient is reported prone to a vulnerability that may allow local attackers to disclose sensitive memory. This can lead to various other attacks against a vulnerable computer. The vulnerability exists in the 'SR_Service.exe', which manages VPN connections. A successful attack may allow the attacker to disclose memory and cause the application to crash. Reportedly, this issue can be leveraged to ultimately execute arbitrary code, however, this has not been confirmed. VPN-1 SecureClient NG FP1 is reported prone to this vulnerability. It is possible that other versions are affected as well. '192.00000000000168.00115.047'
Related ExploitsOther Possible E-DB Search Terms: Check Point VPN-1 SecureClient, Check Point VPN
|2005-12-07||Check Point VPN-1 SecureClient 4.0 < 4.1 - Policy Bypass||Viktor Stei...|
|2008-03-06||Check Point VPN-1 UTM Edge NGX 7.0.48x - Login Page Cross-Site Scripting||Henri Lindberg|
|2000-12-19||Check Point VPN-1/FireWall-1 4.1 SP2 - Blocked Port Bypass||anonymous|