The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability 12090

Check Point Security Gateway: denial of service via SYN Flood

Synthesis of the vulnerability

When the Check Point Security Gateway firewall receives more than 120 000 TCP SYN packets per second, it consumes numerous CPU resources.
Vulnerable products: CheckPoint Security Gateway, VPN-1.
Severity of this weakness: 1/4.
Consequences of a hack: denial of service on server.
Hacker's origin: internet client.
Creation date: 24/10/2012.
Références of this bulletin: sk86721, VIGILANCE-VUL-12090.

Description of the vulnerability

The SYN flag of the TCP protocol is used to initialize sessions.

When the Check Point Security Gateway firewall receives more than 120 000 TCP SYN packets per second, it consumes numerous CPU resources.

This denial of service is not caused by a vulnerability, but Check Point offers methods/patches to optimize performances.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides an application vulnerability watch. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.