ID

VAR-200205-0068


CVE

CVE-2002-0302


TITLE

Symantec Enterprise Firewall Notify Daemon SNMP Data Loss Vulnerability

Trust: 0.9

sources: BID: 4139 // CNNVD: CNNVD-200205-128

DESCRIPTION

The Notify daemon for Symantec Enterprise Firewall (SEF) 6.5.x drops large alerts when SNMP is used as the transport, which could prevent some alerts from being sent in the event of an attack. The Symantec Enterprise Firewall (SEP) is a high performance firewall solution, and is available for both Windows and Solaris systems. SEP includes a notification mechanism for important log messages, which is implemented through the Notify Daemon. It is possible to send notifcations to a specified server through SNMP traps. The SNMP reporting mechanism may, under some circumstances, fail to forward messages. This may occur when the message is over 1024 characters. Although the error is logged, no additional notification is sent. Exploitation of this vulnerability may result in lost information, possibly allowing an attack against the firewall or internal systems to go undetected. Other versions of Symantec Enterprise Firewall may share this vulnerability

Trust: 1.26

sources: NVD: CVE-2002-0302 // BID: 4139 // VULHUB: VHN-4695

AFFECTED PRODUCTS

vendor:symantecmodel:enterprise firewallscope:eqversion:6.5.2

Trust: 1.6

vendor:symantecmodel:enterprise firewallscope:eqversion:7.0

Trust: 1.6

vendor:symantecmodel:enterprise firewall solarisscope:eqversion:7.0

Trust: 0.3

vendor:symantecmodel:enterprise firewall nt/2000scope:eqversion:7.0

Trust: 0.3

vendor:symantecmodel:enterprise firewall nt/2000scope:eqversion:6.5.2

Trust: 0.3

sources: BID: 4139 // CNNVD: CNNVD-200205-128 // NVD: CVE-2002-0302

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0302
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200205-128
value: MEDIUM

Trust: 0.6

VULHUB: VHN-4695
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-0302
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4695
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-4695 // CNNVD: CNNVD-200205-128 // NVD: CVE-2002-0302

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0302

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200205-128

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200205-128

EXTERNAL IDS

db:BIDid:4139

Trust: 2.0

db:NVDid:CVE-2002-0302

Trust: 1.7

db:CNNVDid:CNNVD-200205-128

Trust: 0.7

db:BUGTRAQid:20020220 SYMANTEC ENTERPRISE FIREWALL (SEF) NOTIFY DAEMON DATA LOSS VIA SN MP

Trust: 0.6

db:XFid:8253

Trust: 0.6

db:VULHUBid:VHN-4695

Trust: 0.1

sources: VULHUB: VHN-4695 // BID: 4139 // CNNVD: CNNVD-200205-128 // NVD: CVE-2002-0302

REFERENCES

url:http://www.securityfocus.com/bid/4139

Trust: 1.7

url:http://securityresponse.symantec.com/avcenter/security/content/2002.02.20a.html

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=101424225814604&w=2

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/8253

Trust: 1.1

url:http://marc.theaimsgroup.com/?l=bugtraq&m=101424225814604&w=2

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/8253

Trust: 0.6

url:http://enterprisesecurity.symantec.com/products/products.cfm?productid=47

Trust: 0.3

sources: VULHUB: VHN-4695 // BID: 4139 // CNNVD: CNNVD-200205-128 // NVD: CVE-2002-0302

CREDITS

Discovered by Martin O'Neal <BugTraq@corsaire.com>.

Trust: 0.9

sources: BID: 4139 // CNNVD: CNNVD-200205-128

SOURCES

db:VULHUBid:VHN-4695
db:BIDid:4139
db:CNNVDid:CNNVD-200205-128
db:NVDid:CVE-2002-0302

LAST UPDATE DATE

2025-04-03T22:37:37.991000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-4695date:2017-10-10T00:00:00
db:BIDid:4139date:2002-02-20T00:00:00
db:CNNVDid:CNNVD-200205-128date:2005-05-02T00:00:00
db:NVDid:CVE-2002-0302date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-4695date:2002-05-31T00:00:00
db:BIDid:4139date:2002-02-20T00:00:00
db:CNNVDid:CNNVD-200205-128date:2002-05-31T00:00:00
db:NVDid:CVE-2002-0302date:2002-05-31T04:00:00