ID

VAR-200210-0165


CVE

CVE-2002-0990


TITLE

Multiple Symantec Firewall Secure Webserver Error Request Remote Denial of Service Attack Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200210-292

DESCRIPTION

The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout. A denial of service vulnerability has been reported in this component. According to the report, the proxy blocks while attempting to resolve hostnames specified in CONNECT requests. While this is occuring, requests from other clients are not handled. This behaviour can be exploited to cause a denial of service condition. There is a problem when the WEB proxy service program of the firewall handles non-existing internal URLs. By submitting non-existent or wrong internal URL requests multiple times, the proxy service program may time out for a period of time without responding to subsequent proxy request connections, resulting in Denial of service attack

Trust: 1.26

sources: NVD: CVE-2002-0990 // BID: 5958 // VULHUB: VHN-5379

AFFECTED PRODUCTS

vendor:symantecmodel:velociraptorscope:eqversion:500

Trust: 1.9

vendor:symantecmodel:velociraptorscope:eqversion:1300

Trust: 1.9

vendor:symantecmodel:velociraptorscope:eqversion:1200

Trust: 1.9

vendor:symantecmodel:velociraptorscope:eqversion:1000

Trust: 1.9

vendor:symantecmodel:enterprise firewallscope:eqversion:6.5.2

Trust: 1.6

vendor:symantecmodel:gateway securityscope:eqversion:5200

Trust: 1.6

vendor:symantecmodel:raptor firewallscope:eqversion:6.5.3

Trust: 1.6

vendor:symantecmodel:raptor firewallscope:eqversion:6.5

Trust: 1.6

vendor:symantecmodel:enterprise firewallscope:eqversion:7.0

Trust: 1.6

vendor:symantecmodel:velociraptorscope:eqversion:700

Trust: 1.3

vendor:symantecmodel:velociraptorscope:eqversion:1100

Trust: 1.3

vendor:symantecmodel:gateway securityscope:eqversion:5300

Trust: 1.3

vendor:symantecmodel:gateway securityscope:eqversion:5110

Trust: 1.0

vendor:symantecmodel:raptor firewall solarisscope:eqversion:6.5.3

Trust: 0.3

vendor:symantecmodel:raptor firewall windows ntscope:eqversion:6.5

Trust: 0.3

vendor:symantecmodel:gateway securityscope:eqversion:52001.0

Trust: 0.3

vendor:symantecmodel:gateway securityscope:eqversion:51101.0

Trust: 0.3

vendor:symantecmodel:enterprise firewall solarisscope:eqversion:7.0

Trust: 0.3

vendor:symantecmodel:enterprise firewall nt/2000scope:eqversion:7.0

Trust: 0.3

vendor:symantecmodel:enterprise firewall nt/2000scope:eqversion:6.5.2

Trust: 0.3

sources: BID: 5958 // CNNVD: CNNVD-200210-292 // NVD: CVE-2002-0990

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0990
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200210-292
value: MEDIUM

Trust: 0.6

VULHUB: VHN-5379
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-0990
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-5379
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-5379 // CNNVD: CNNVD-200210-292 // NVD: CVE-2002-0990

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0990

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200210-292

TYPE

Design Error

Trust: 0.9

sources: BID: 5958 // CNNVD: CNNVD-200210-292

EXTERNAL IDS

db:BIDid:5958

Trust: 2.0

db:NVDid:CVE-2002-0990

Trust: 2.0

db:CNNVDid:CNNVD-200210-292

Trust: 0.7

db:BUGTRAQid:20021014 MULTIPLE SYMANTEC FIREWALL SECURE WEBSERVER TIMEOUT DOS

Trust: 0.6

db:XFid:10364

Trust: 0.6

db:VULHUBid:VHN-5379

Trust: 0.1

sources: VULHUB: VHN-5379 // BID: 5958 // CNNVD: CNNVD-200210-292 // NVD: CVE-2002-0990

REFERENCES

url:http://www.securityfocus.com/bid/5958

Trust: 1.7

url:http://securityresponse.symantec.com/avcenter/security/content/2002.10.11.html

Trust: 1.7

url:http://www.iss.net/security_center/static/10364.php

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=103463869503124&w=2

Trust: 1.1

url:http://marc.theaimsgroup.com/?l=bugtraq&m=103463869503124&w=2

Trust: 0.6

sources: VULHUB: VHN-5379 // CNNVD: CNNVD-200210-292 // NVD: CVE-2002-0990

CREDITS

AI-SEC Security Advisories※ advisories@ai-sec.dk

Trust: 0.6

sources: CNNVD: CNNVD-200210-292

SOURCES

db:VULHUBid:VHN-5379
db:BIDid:5958
db:CNNVDid:CNNVD-200210-292
db:NVDid:CVE-2002-0990

LAST UPDATE DATE

2024-08-14T14:29:36.391000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-5379date:2016-10-18T00:00:00
db:BIDid:5958date:2009-07-11T18:06:00
db:CNNVDid:CNNVD-200210-292date:2005-05-13T00:00:00
db:NVDid:CVE-2002-0990date:2016-10-18T02:23:21.303

SOURCES RELEASE DATE

db:VULHUBid:VHN-5379date:2002-10-28T00:00:00
db:BIDid:5958date:2002-10-14T00:00:00
db:CNNVDid:CNNVD-200210-292date:2002-10-28T00:00:00
db:NVDid:CVE-2002-0990date:2002-10-28T05:00:00