ID

VAR-200005-0080


CVE

CVE-2000-0437


TITLE

Gauntlet Firewall Remote Buffer Overflow Vulnerability

Trust: 0.9

sources: BID: 1234 // CNNVD: CNNVD-200005-073

DESCRIPTION

Buffer overflow in the CyberPatrol daemon "cyberdaemon" used in gauntlet and WebShield allows remote attackers to cause a denial of service or execute arbitrary commands. A buffer overflow exists in the version of Mattel's Cyber Patrol software integrated in to Network Associates Gauntlet firewall, versions 4.1, 4.2, 5.0 and 5.5. Due to the manner in which Cyber Patrol was integrated, a vulnerability was introduced which could allow a remote attacker to gain root access on the firewall, or execute arbitrary commands on the firewall. By default, Cyber Patrol is installed on Gauntlet installations, and runs for 30 days. After that period, it is disabled. During this 30 day period, the firewall is susceptible to attack,. Due to the filtering software being externally accessible, users not on the internal network may also be able to exploit the vulnerability. Some versions of SGI IRIX shipped with the Gauntlet Firewall package, and in the past it was a supported SGI product. While it is no longer being supported, SGI IRIX versions 6.5.2, 6.5.3, 6.5.4 and 6.5.5 may be prone to this issue

Trust: 1.26

sources: NVD: CVE-2000-0437 // BID: 1234 // VULHUB: VHN-2016

AFFECTED PRODUCTS

vendor:network associatesmodel:gauntlet firewallscope:eqversion:5.0

Trust: 1.6

vendor:network associatesmodel:webshield e-ppliancescope:eqversion:100.0

Trust: 1.6

vendor:network associatesmodel:webshieldscope:eqversion:4.0

Trust: 1.6

vendor:network associatesmodel:gauntlet firewallscope:eqversion:5.5

Trust: 1.6

vendor:network associatesmodel:gauntlet firewallscope:eqversion:4.2

Trust: 1.6

vendor:network associatesmodel:webshield e-ppliancescope:eqversion:300.0

Trust: 1.6

vendor:network associatesmodel:gauntlet firewallscope:eqversion:4.1

Trust: 1.6

vendor:sgimodel:irixscope:eqversion:6.5.5

Trust: 0.3

vendor:sgimodel:irixscope:eqversion:6.5.4

Trust: 0.3

vendor:sgimodel:irixscope:eqversion:6.5.3

Trust: 0.3

vendor:sgimodel:irixscope:eqversion:6.5.2

Trust: 0.3

vendor:networkmodel:associates webshield for solarisscope:eqversion:4.0

Trust: 0.3

vendor:networkmodel:associates webshield e-ppliancescope:eqversion:300.0

Trust: 0.3

vendor:networkmodel:associates webshield e-ppliancescope:eqversion:100.0

Trust: 0.3

vendor:networkmodel:associates gauntlet firewallscope:eqversion:5.5

Trust: 0.3

vendor:networkmodel:associates gauntlet firewallscope:eqversion:5.0

Trust: 0.3

vendor:networkmodel:associates gauntlet firewallscope:eqversion:4.2

Trust: 0.3

vendor:networkmodel:associates gauntlet firewallscope:eqversion:4.1

Trust: 0.3

sources: BID: 1234 // CNNVD: CNNVD-200005-073 // NVD: CVE-2000-0437

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2000-0437
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200005-073
value: CRITICAL

Trust: 0.6

VULHUB: VHN-2016
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2000-0437
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-2016
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-2016 // CNNVD: CNNVD-200005-073 // NVD: CVE-2000-0437

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2000-0437

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200005-073

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200005-073

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-2016

EXTERNAL IDS

db:BIDid:1234

Trust: 2.0

db:NVDid:CVE-2000-0437

Trust: 2.0

db:OSVDBid:322

Trust: 1.7

db:CNNVDid:CNNVD-200005-073

Trust: 0.7

db:BUGTRAQid:20000522 GAUNTLET CYBERPATROL BUFFER OVERFLOW

Trust: 0.6

db:EXPLOIT-DBid:19949

Trust: 0.1

db:VULHUBid:VHN-2016

Trust: 0.1

sources: VULHUB: VHN-2016 // BID: 1234 // CNNVD: CNNVD-200005-073 // NVD: CVE-2000-0437

REFERENCES

url:http://www.pgp.com/jump/gauntlet_advisory.asp

Trust: 3.0

url:http://www.tis.com/support/cyberadvisory.html

Trust: 3.0

url:http://www.securityfocus.com/bid/1234

Trust: 2.7

url:http://archives.neohapsis.com/archives/bugtraq/2000-05/0249.html

Trust: 2.7

url:http://www.osvdb.org/322

Trust: 2.7

url: -

Trust: 0.1

sources: VULHUB: VHN-2016 // BID: 1234 // CNNVD: CNNVD-200005-073 // NVD: CVE-2000-0437

CREDITS

This vulnerability was discovered by Jim Stickley, with Garrison Technologies, and was reported to SecurityFocus.com on May 19, 2000.

Trust: 0.9

sources: BID: 1234 // CNNVD: CNNVD-200005-073

SOURCES

db:VULHUBid:VHN-2016
db:BIDid:1234
db:CNNVDid:CNNVD-200005-073
db:NVDid:CVE-2000-0437

LAST UPDATE DATE

2024-11-22T22:48:38.039000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-2016date:2008-09-10T00:00:00
db:BIDid:1234date:2009-07-11T01:56:00
db:CNNVDid:CNNVD-200005-073date:2005-10-12T00:00:00
db:NVDid:CVE-2000-0437date:2024-11-20T23:32:30.227

SOURCES RELEASE DATE

db:VULHUBid:VHN-2016date:2000-05-18T00:00:00
db:BIDid:1234date:2000-05-18T00:00:00
db:CNNVDid:CNNVD-200005-073date:2000-05-18T00:00:00
db:NVDid:CVE-2000-0437date:2000-05-18T04:00:00