<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Are the SMB devices vulnerable to DNSpooQ? in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/109818#M4819</link>
    <description>&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Thu, 04 Feb 2021 14:55:13 GMT</pubDate>
    <dc:creator>Steffen_Appel</dc:creator>
    <dc:date>2021-02-04T14:55:13Z</dc:date>
    <item>
      <title>Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108416#M4723</link>
      <description>&lt;P&gt;1100/1400/1500 are using DNSmasq in version 2.78, which is vulnerable to DNSpooQ: &lt;A href="https://www.jsof-tech.com/disclosures/dnspooq/" target="_blank"&gt;https://www.jsof-tech.com/disclosures/dnspooq/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could anybody confirm this? And if yes, when will there be a fix?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 15:25:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108416#M4723</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2021-01-21T15:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108426#M4724</link>
      <description>&lt;P&gt;I can only find sk35484 Check Point response to DNS poisoning vulnerability CVE-2008-1447 stating:&lt;/P&gt;
&lt;P&gt;On July 8, 2008 CERT announced a new DNS cache poisoning technique that exploits the fact that DNS servers send requests with non random source ports. &lt;BR /&gt;&lt;BR /&gt;Check Point products are &lt;STRONG&gt;not&lt;/STRONG&gt; vulnerable to this attack for the following reasons:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Check Point products do not implement DNS server functionality.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 21 Jan 2021 17:03:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108426#M4724</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-01-21T17:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108433#M4725</link>
      <description>&lt;P&gt;Possible we’ve patched this already, I’ll check.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 17:21:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108433#M4725</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-21T17:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108450#M4726</link>
      <description>&lt;P&gt;cough cough cough&lt;/P&gt;&lt;P&gt;[Expert@1500]# netstat -anp | grep dnsmasq&lt;BR /&gt;tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 4190/dnsmasq&lt;BR /&gt;tcp 0 0 :::53 :::* LISTEN 4190/dnsmasq&lt;BR /&gt;udp 0 0 0.0.0.0:53 0.0.0.0:* 4190/dnsmasq&lt;BR /&gt;udp 0 0 :::53 :::* 4190/dnsmasq&lt;BR /&gt;unix 2 [ ] DGRAM 1861 4190/dnsmasq&lt;BR /&gt;[Expert@1500]#&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 22:11:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108450#M4726</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2021-01-21T22:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108455#M4727</link>
      <description>&lt;P&gt;That's an old SK that doesn't reference this particular issue.&lt;BR /&gt;In any case, we're not vulnerable because:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;We don't use DNSSEC&lt;/LI&gt;
&lt;LI&gt;We only use local zones and not registered ones&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;See:&amp;nbsp;&lt;A href="https://kb.cert.org/vuls/id/434904" target="_blank"&gt;https://kb.cert.org/vuls/id/434904&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 00:18:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108455#M4727</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-22T00:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108475#M4728</link>
      <description>&lt;P&gt;That is a different bug from 13 years ago.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 07:56:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108475#M4728</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2021-01-22T07:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108476#M4729</link>
      <description>&lt;P&gt;The second set of issues does not requie DNSSEC:&lt;/P&gt;&lt;P&gt;JSOF also reported vulnerabilities in DNS response validation that can result in DNS cache poisoning.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;CVE-2020-25684: Dnsmasq does not validate the combination of address/port and the query-id fields of DNS request when accepting DNS responses&lt;/LI&gt;&lt;LI&gt;CVE-2020-25685: Dnsmasq uses a weak hashing algorithm (CRC32) when compiled without DNSSEC to validate DNS responses&lt;/LI&gt;&lt;LI&gt;CVE-2020-25686: Dnsmasq does not check for an existing pending request for the same name and forwards a new request thus allowing an attacker to perform a &lt;A href="https://tools.ietf.org/html/rfc5452#section-5" target="_blank"&gt;"Birthday Attack"&lt;/A&gt; scenario to forge replies and potentially poison the DNS cache&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Seems like these one could be an issue.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 07:56:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108476#M4729</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2021-01-22T07:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108477#M4730</link>
      <description>&lt;P&gt;I know - i can already read&amp;nbsp; 8)&lt;/img&gt; and told you above i have only found something about the grandpa of these CVEs.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 08:06:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108477#M4730</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-01-22T08:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108478#M4731</link>
      <description>&lt;P&gt;Sure but once again, these are similar but really old.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 08:11:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108478#M4731</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2021-01-22T08:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108480#M4732</link>
      <description>&lt;P&gt;To the best of my knowledge, we are not vulnerable to any of the issues mentioned.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 08:31:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108480#M4732</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-22T08:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108484#M4733</link>
      <description>&lt;P&gt;Once again: I know. I have cited what i did find and not claimed to have found something about your issue. And i also know&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?js_peid=P-14d3e6d9e20-10001&amp;amp;eventSubmit_doGoviewsolutiondetails&amp;amp;solutionid=sk35623" target="_blank" rel="noopener"&gt;sk35623: Hide NAT cancels DNS source port randomization&lt;/A&gt;. &lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?js_peid=P-14d3e6d9e20-10001&amp;amp;eventSubmit_doGoviewsolutiondetails&amp;amp;solutionid=sk35624" target="_blank" rel="noopener"&gt;sk35624: Preventing DNS cache poisoning when reusing source ports&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 08:44:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108484#M4733</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-01-22T08:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108494#M4734</link>
      <description>&lt;P&gt;Yes but unreletant bugs are not useful to answer the question &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 09:35:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108494#M4734</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2021-01-22T09:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108495#M4735</link>
      <description>&lt;P&gt;Could you please check with R&amp;amp;D as the version on the appliance is 2.78 and the first unaffected is 2.83.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 09:37:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108495#M4735</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2021-01-22T09:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108518#M4736</link>
      <description>&lt;P&gt;Or you know since its GPL code you could give access to customers so they could see for themselves.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 13:48:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108518#M4736</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2021-01-22T13:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108550#M4738</link>
      <description>&lt;P&gt;When we say “not vulnerable” that generally means one of two things:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;We patched the vulnerable code already (often without updating the version)&lt;/LI&gt;
&lt;LI&gt;Due to configuration/usage, it is not possible to exploit the vulnerability remotely.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I recommend a TAC case if you would like a more formal answer.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 04:21:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108550#M4738</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-29T04:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108651#M4739</link>
      <description>&lt;P&gt;See for themselves ? How ? All customers i know of are absolutely GPL code blind 8)&lt;/img&gt;. I would suggest that CP answers the question once for all instead.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 09:41:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108651#M4739</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-01-24T09:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108652#M4740</link>
      <description>&lt;P&gt;Did you ever read these "unreletant" SKs ? Silently shaking my head...&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 09:45:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108652#M4740</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-01-24T09:45:04Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108722#M4743</link>
      <description>&lt;P&gt;We're all trying to help out.&lt;BR /&gt;Let's keep it friendly &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 07:43:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108722#M4743</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-25T07:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108852#M4749</link>
      <description>&lt;P&gt;I opened a TAC case, let's see what they will answer.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 09:59:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108852#M4749</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2021-01-26T09:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: Are the SMB devices vulnerable to DNSpooQ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108880#M4750</link>
      <description>&lt;P&gt;According to &lt;A href="https://www.jsof-tech.com/wp-content/uploads/2021/01/DNSpooq-Technical-WP.pdf," target="_blank"&gt;https://www.jsof-tech.com/wp-content/uploads/2021/01/DNSpooq-Technical-WP.pdf,&lt;/A&gt; the SMB use -c 0 on dnsmasq and thereby disable the cache and avoid the attack by this&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 13:43:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Are-the-SMB-devices-vulnerable-to-DNSpooQ/m-p/108880#M4750</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2021-01-26T13:43:47Z</dc:date>
    </item>
  </channel>
</rss>

