Check Point FireWall-1 format string

fw1-format-string (14149) The risk level is classified as HighHigh Risk


Check Point FireWall-1 contains a format string vulnerability. In many typical installations, an attacker may be able to run commands under the security context of the super-user, usually SYSTEM or root.


Gain Access


For vulnerability detection:

Enable the following checks in the ISS Protection Platform:

For Virtual Patch:

Enable the following checks in the ISS Protection Platform:

For Manual Protection:

Upload and install the Firewall-1 HTTP Security Hotfix from the Check Point Web site. See References.


  • Check Point Web site: FireWall-1 HTTP Security Server Hotfix.
  • CIAC Information Bulletin O-072: Check Point FireWall-1 HTTP Security Server Vulnerability.
  • Internet Security Systems Security Advisory, February 4, 2004: Checkpoint Firewall-1 HTTP Parsing Format String Vulnerabilities.
  • BID-9581: Multiple Check Point Firewall-1 HTTP Security Server Remote Format String Vulnerabilities
  • CVE-2004-0039: Multiple format string vulnerabilities in HTTP Application Intelligence (AI) component in Check Point Firewall-1 NG-AI R55 and R54, and Check Point Firewall-1 HTTP Security Server included with NG FP1, FP2, and FP3 allows remote attackers to execute arbitrary code via HTTP requests that cause format string specifiers to be used in an error message, as demonstrated using the scheme of a URI.
  • OSVDB ID: 4414: Check Point FireWall-1 HTTP Server Format String
  • US-CERT VU#790771: HTTP Parsing Vulnerabilities in Check Point Firewall-1

Platforms Affected:

  • CheckPoint FireWall-1 Next Generation FP1
  • CheckPoint FireWall-1 Next Generation FP2
  • CheckPoint FireWall-1 Next Generation FP3 HF2
  • CheckPoint FireWall-1 Next Generation FP3
  • CheckPoint FireWall-1 Next Generation FP3 HF1
  • CheckPoint Next Generation
  • CheckPoint NG-AI R54
  • CheckPoint NG-AI R55


Feb 04, 2004

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page