ID

VAR-200412-0169


CVE

CVE-2004-1472


TITLE

Symantec Firewall/VPN appliance vulnerable to DoS via UDP port scan

Trust: 0.8

sources: CERT/CC: VU#441078

DESCRIPTION

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 allow remote attackers to cause a denial of service (device freeze) via a fast UDP port scan on the WAN interface. These issues are due to a failure of the application to handle exceptional conditions, a default configuration issue exists as well. An attacker can leverage a denial of service issue to cause the affected appliance to stop responding, requiring a power off to bring the device back to functionality. A filter bypass issue allows an attacker to bypass the filters on the 'tftpd', 'snmpd', and 'isakmp' services. An attacker can also read and write the community string of the affected device by default, facilitating disclosure and altering of the device's settings. Symantec Nexland legacy firewall appliances are also affected by these issues. Symantec Enterprise Firewall/VPN is an enterprise-level firewall/VPN system. Symantec Enterprise Firewall/VPN has a default public string, and remote attackers can use this value to obtain sensitive information or perform some configuration operations. Firewalls have default read/write public strings that allow attackers to collect and change firewall configurations. By combining other vulnerabilities, an attacker can send SNMP GET/SET requests to the WAN interface

Trust: 3.42

sources: NVD: CVE-2004-1472 // CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // BID: 11237 // VULHUB: VHN-9902

AFFECTED PRODUCTS

vendor:symantecmodel: - scope: - version: -

Trust: 2.4

vendor:symantecmodel:gateway securityscope:eqversion:360

Trust: 1.9

vendor:symantecmodel:gateway securityscope:eqversion:320

Trust: 1.9

vendor:symantecmodel:gateway securityscope:eqversion:360r

Trust: 1.6

vendor:symantecmodel:nexland pro400 firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:firewall vpn appliance 200rscope:eqversion:*

Trust: 1.0

vendor:symantecmodel:firewall vpn appliance 200scope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland pro800 firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland wavebase firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:firewall vpn appliance 100scope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland pro800turbo firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland isb soho firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland pro100 firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland pro800turbo firewall appliancescope: - version: -

Trust: 0.9

vendor:symantecmodel:nexland pro800 firewall appliancescope: - version: -

Trust: 0.9

vendor:symantecmodel:nexland pro400 firewall appliancescope: - version: -

Trust: 0.9

vendor:symantecmodel:nexland pro100 firewall appliancescope: - version: -

Trust: 0.9

vendor:symantecmodel:firewall vpn appliance 200rscope: - version: -

Trust: 0.6

vendor:symantecmodel:firewall vpn appliance 100scope: - version: -

Trust: 0.6

vendor:symantecmodel:firewall vpn appliance 200scope: - version: -

Trust: 0.6

vendor:symantecmodel:nexland wavebase firewall appliancescope: - version: -

Trust: 0.3

vendor:symantecmodel:nexland isb soho firewall appliancescope: - version: -

Trust: 0.3

vendor:symantecmodel:gateway security 360rscope: - version: -

Trust: 0.3

vendor:symantecmodel:firewall/vpn appliance 200rscope: - version: -

Trust: 0.3

vendor:symantecmodel:firewall/vpn appliancescope:eqversion:200

Trust: 0.3

vendor:symantecmodel:firewall/vpn appliancescope:eqversion:100

Trust: 0.3

sources: CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // BID: 11237 // CNNVD: CNNVD-200412-477 // NVD: CVE-2004-1472

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-1472
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#441078
value: 5.78

Trust: 0.8

CARNEGIE MELLON: VU#329230
value: 6.06

Trust: 0.8

CARNEGIE MELLON: VU#173910
value: 15.59

Trust: 0.8

CNNVD: CNNVD-200412-477
value: MEDIUM

Trust: 0.6

VULHUB: VHN-9902
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-1472
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-9902
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // VULHUB: VHN-9902 // CNNVD: CNNVD-200412-477 // NVD: CVE-2004-1472

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-1472

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200412-477

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200412-477

EXTERNAL IDS

db:BIDid:11237

Trust: 4.4

db:SECUNIAid:12635

Trust: 4.1

db:CERT/CCid:VU#441078

Trust: 2.5

db:SECTRACKid:1011389

Trust: 2.4

db:NVDid:CVE-2004-1472

Trust: 1.7

db:OSVDBid:10204

Trust: 1.7

db:SECTRACKid:1011388

Trust: 1.6

db:CERT/CCid:VU#329230

Trust: 0.8

db:OSVDBid:10206

Trust: 0.8

db:CERT/CCid:VU#173910

Trust: 0.8

db:CNNVDid:CNNVD-200412-477

Trust: 0.7

db:NSFOCUSid:6941

Trust: 0.6

db:NSFOCUSid:6943

Trust: 0.6

db:NSFOCUSid:6943※6942※6941

Trust: 0.6

db:NSFOCUSid:6942

Trust: 0.6

db:BUGTRAQid:20040922 MULTIPLE VULNERABILITIES IN SYMANTEC ENTERPRISE FIREWALL/GATEWAY SECURITY PRODUCTS

Trust: 0.6

db:XFid:17469

Trust: 0.6

db:VULHUBid:VHN-9902

Trust: 0.1

sources: CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // VULHUB: VHN-9902 // BID: 11237 // CNNVD: CNNVD-200412-477 // NVD: CVE-2004-1472

REFERENCES

url:http://www.securityfocus.com/bid/11237

Trust: 4.1

url:http://www.sarc.com/avcenter/security/content/2004.09.22.html

Trust: 2.4

url:http://www.rigelksecurity.com/services/svcs_sec_advis.html

Trust: 2.4

url:http://secunia.com/advisories/12635/

Trust: 2.4

url:http://www.securitytracker.com/alerts/2004/sep/1011389.html

Trust: 2.4

url:http://securityresponse.symantec.com/avcenter/security/content/2004.09.22.html

Trust: 2.0

url:http://www.kb.cert.org/vuls/id/441078

Trust: 1.7

url:http://www.osvdb.org/10204

Trust: 1.7

url:http://secunia.com/advisories/12635

Trust: 1.7

url:http://www.securitytracker.com/alerts/2004/sep/1011388.html

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/17469

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=109588376426070&w=2

Trust: 1.0

url:http://www.osvdb.org/displayvuln.php?osvdb_id=10206

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/17469

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=109588376426070&w=2

Trust: 0.6

url:http://www.nsfocus.net/vulndb/6943※6942※6941

Trust: 0.6

url:http://www.symantec.com/techsupp

Trust: 0.3

url:http://enterprisesecurity.symantec.com/products/products.cfm?productid=133&eid=0

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:/archive/1/376029

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=109588376426070&w=2

Trust: 0.1

sources: CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // VULHUB: VHN-9902 // BID: 11237 // CNNVD: CNNVD-200412-477 // NVD: CVE-2004-1472

CREDITS

Mike Sues※ msues@rigelksecurity.com

Trust: 0.6

sources: CNNVD: CNNVD-200412-477

SOURCES

db:CERT/CCid:VU#441078
db:CERT/CCid:VU#329230
db:CERT/CCid:VU#173910
db:VULHUBid:VHN-9902
db:BIDid:11237
db:CNNVDid:CNNVD-200412-477
db:NVDid:CVE-2004-1472

LAST UPDATE DATE

2024-08-14T14:00:44.775000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#441078date:2004-10-20T00:00:00
db:CERT/CCid:VU#329230date:2004-10-20T00:00:00
db:CERT/CCid:VU#173910date:2004-10-20T00:00:00
db:VULHUBid:VHN-9902date:2017-07-11T00:00:00
db:BIDid:11237date:2004-09-22T00:00:00
db:CNNVDid:CNNVD-200412-477date:2005-10-20T00:00:00
db:NVDid:CVE-2004-1472date:2017-07-11T01:31:03.810

SOURCES RELEASE DATE

db:CERT/CCid:VU#441078date:2004-10-20T00:00:00
db:CERT/CCid:VU#329230date:2004-10-20T00:00:00
db:CERT/CCid:VU#173910date:2004-10-20T00:00:00
db:VULHUBid:VHN-9902date:2004-12-31T00:00:00
db:BIDid:11237date:2004-09-22T00:00:00
db:CNNVDid:CNNVD-200412-477date:2004-09-22T00:00:00
db:NVDid:CVE-2004-1472date:2004-12-31T05:00:00