<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Renegotiation DoS Vulnerability in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Renegotiation-DoS-Vulnerability/m-p/211957#M10540</link>
    <description>&lt;P&gt;I got a scan report of my ip address.&lt;/P&gt;&lt;P&gt;Content of the report is:&lt;BR /&gt;The flaw exists because the remote SSL/TLS service does not properly restrict client-initiated renegotiation within the SSL and TLS protocols.&lt;BR /&gt;Note: The referenced CVEs are affecting OpenSSL and Mozilla Network Security Services (NSS) but both are in a DISPUTED state with the following rationale:&lt;BR /&gt;&amp;gt; It can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.&lt;BR /&gt;Both CVEs are still kept in this VT as a reference to the origin of this flaw.&lt;BR /&gt;Detection method&lt;BR /&gt;Checks if the remote service allows to re-do the same SSL/TLS handshake (Renegotiation) over an existing / already established SSL/TLS connection.&lt;BR /&gt;Evidence&lt;BR /&gt;Address&lt;BR /&gt;&lt;A href="https://xxx.xxx.net/" target="_blank"&gt;https://xxx.xxx.net/&lt;/A&gt; The following indicates that the remote SSL/TLS service is affected:&lt;BR /&gt;Protocol Version | Successful re-done SSL/TLS handshakes (Renegotiation) over an existing / already established SSL/TLS connection&lt;BR /&gt;TLSv1.2 | 10&lt;BR /&gt;Solution&lt;BR /&gt;Users should contact their vendors for specific patch information.&lt;BR /&gt;A general solution is to remove/disable renegotiation capabilities altogether from/in the affected SSL/TLS service. VendorFix&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And the ref. to&amp;nbsp;SSL/TLS: Renegotiation DoS Vulnerability (CVE-2011-1473, CVE-2011-5094)&lt;/P&gt;&lt;P&gt;I can't find a way to disable Client-Initiated Renegotiation.&lt;/P&gt;</description>
    <pubDate>Mon, 22 Apr 2024 11:48:09 GMT</pubDate>
    <dc:creator>CPnoob</dc:creator>
    <dc:date>2024-04-22T11:48:09Z</dc:date>
    <item>
      <title>Renegotiation DoS Vulnerability</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Renegotiation-DoS-Vulnerability/m-p/211957#M10540</link>
      <description>&lt;P&gt;I got a scan report of my ip address.&lt;/P&gt;&lt;P&gt;Content of the report is:&lt;BR /&gt;The flaw exists because the remote SSL/TLS service does not properly restrict client-initiated renegotiation within the SSL and TLS protocols.&lt;BR /&gt;Note: The referenced CVEs are affecting OpenSSL and Mozilla Network Security Services (NSS) but both are in a DISPUTED state with the following rationale:&lt;BR /&gt;&amp;gt; It can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.&lt;BR /&gt;Both CVEs are still kept in this VT as a reference to the origin of this flaw.&lt;BR /&gt;Detection method&lt;BR /&gt;Checks if the remote service allows to re-do the same SSL/TLS handshake (Renegotiation) over an existing / already established SSL/TLS connection.&lt;BR /&gt;Evidence&lt;BR /&gt;Address&lt;BR /&gt;&lt;A href="https://xxx.xxx.net/" target="_blank"&gt;https://xxx.xxx.net/&lt;/A&gt; The following indicates that the remote SSL/TLS service is affected:&lt;BR /&gt;Protocol Version | Successful re-done SSL/TLS handshakes (Renegotiation) over an existing / already established SSL/TLS connection&lt;BR /&gt;TLSv1.2 | 10&lt;BR /&gt;Solution&lt;BR /&gt;Users should contact their vendors for specific patch information.&lt;BR /&gt;A general solution is to remove/disable renegotiation capabilities altogether from/in the affected SSL/TLS service. VendorFix&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And the ref. to&amp;nbsp;SSL/TLS: Renegotiation DoS Vulnerability (CVE-2011-1473, CVE-2011-5094)&lt;/P&gt;&lt;P&gt;I can't find a way to disable Client-Initiated Renegotiation.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 11:48:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Renegotiation-DoS-Vulnerability/m-p/211957#M10540</guid>
      <dc:creator>CPnoob</dc:creator>
      <dc:date>2024-04-22T11:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: Renegotiation DoS Vulnerability</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Renegotiation-DoS-Vulnerability/m-p/211964#M10541</link>
      <description>&lt;P&gt;&lt;SPAN&gt;CVE-2011-5094:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Not related to Check Point: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2011-5094#vulnCurrentDescriptionTitle" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2011-5094#vulnCurrentDescriptionTitle&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CVE-2011-1473:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE class="footnote" border="1" width="95%" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Not exploitable, as Check Point puts all sorts of protections against DoS on the gateway (limiting the number of connections, limiting the amount of data, etc.) and this CVE is not even considered a vulnerability in OpenSSL by the community.&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Mon, 22 Apr 2024 13:56:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Renegotiation-DoS-Vulnerability/m-p/211964#M10541</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-04-22T13:56:02Z</dc:date>
    </item>
  </channel>
</rss>

