The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack.

Technical Details

CVSSv2 Score:




Published Date:

Saturday 8th of September 2001

Modified Date:

Tuesday 19th of December 2017

CVSSv2 Score:
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication Required: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: Partial
Common Platform Enumeration (CPE) Affected: Common Platform Enumeration (CPE) List:

Reference: Find your Vulnerabilities:

Find out if you have vulnerabilities exposing you to hackers and malware: Download Mageni's Free Edition

Keyword Search

Search CVEs, Products and Vendors.

Don't pay for a vulnerability scanning and management platform. This one is free.

Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.