[22965] in bugtraq
Check Point VPN-1 SecuRemote Flaw
daemon@ATHENA.MIT.EDU (Kratter, Dave)
Tue Oct 23 17:16:51 2001
Message-ID: <6500077F6075D411B1D0009027B7032CA623B5@nymail1.mimeo.com>
From: "Kratter, Dave" <dave@mimeo.com>
To: "'bugtraq@securityfocus.com'" <bugtraq@securityfocus.com>
Date: Tue, 23 Oct 2001 17:07:05 -0400
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Summary:
SecuRemote will show whether a username is recognized during failed
login attempts
Versions Tested:
4.1 SP4 (4185) VPN+Strong for Windows 2000
4.1 SP4 (4185) VPN+Strong for Windows NT
Description:
During an authentication attempt in the VPN-1 SecuRemote
Authentication dialog box, a failed login due to an incorrect username or
password will result in different responses, depending on the nature of the
failure. If the username is valid and the password is incorrect, SecuRemote
will return a dialog box with the message "Access denied by FireWall-1
authentication". However, if the username is invalid, SecuRemote will return
a dialog box with the message "User <unknown_user> not found". While this is
not a security hole per se, it does allow someone to determine valid
firewall usernames (given enough patience).
Workaround:
Unknown
Vendor Status:
Check Point was notified on October 16, 2001
David B. Kratter
Mimeo.com, Inc.
Quality Assurance Technical Engineer
Mimeo.com. Click.Print.Bind.Deliver.sm