ID

VAR-200412-0171


CVE

CVE-2004-1474


TITLE

Symantec Firewall/VPN appliance vulnerable to DoS via UDP port scan

Trust: 0.8

sources: CERT/CC: VU#441078

DESCRIPTION

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file. These issues are due to a failure of the application to handle exceptional conditions, a default configuration issue exists as well. An attacker can leverage a denial of service issue to cause the affected appliance to stop responding, requiring a power off to bring the device back to functionality. A filter bypass issue allows an attacker to bypass the filters on the 'tftpd', 'snmpd', and 'isakmp' services. An attacker can also read and write the community string of the affected device by default, facilitating disclosure and altering of the device's settings. Symantec Nexland legacy firewall appliances are also affected by these issues. Symantec Enterprise Firewall/VPN is an enterprise-level firewall/VPN system. Firewalls have default read/write public strings that allow attackers to collect and change firewall configurations. By combining other vulnerabilities, an attacker can send SNMP GET/SET requests to the WAN interface

Trust: 3.42

sources: NVD: CVE-2004-1474 // CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // BID: 11237 // VULHUB: VHN-9904

AFFECTED PRODUCTS

vendor:symantecmodel: - scope: - version: -

Trust: 2.4

vendor:symantecmodel:gateway security 360scope:eqversion:*

Trust: 1.0

vendor:symantecmodel:gateway security 320scope:eqversion:*

Trust: 1.0

vendor:symantecmodel:firewall vpn appliance 200rscope:eqversion:*

Trust: 1.0

vendor:symantecmodel:firewall vpn appliance 200scope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland pro800 firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland wavebase firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:firewall vpn appliance 100scope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland pro800turbo firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland pro400 firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:gateway security 360rscope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland isb soho firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland pro100 firewall appliancescope:eqversion:*

Trust: 1.0

vendor:symantecmodel:nexland wavebase firewall appliancescope: - version: -

Trust: 0.9

vendor:symantecmodel:nexland pro400 firewall appliancescope: - version: -

Trust: 0.9

vendor:symantecmodel:nexland pro100 firewall appliancescope: - version: -

Trust: 0.9

vendor:symantecmodel:nexland isb soho firewall appliancescope: - version: -

Trust: 0.9

vendor:symantecmodel:gateway security 360rscope: - version: -

Trust: 0.9

vendor:symantecmodel:gateway security 360scope: - version: -

Trust: 0.6

vendor:symantecmodel:firewall vpn appliance 200rscope: - version: -

Trust: 0.6

vendor:symantecmodel:firewall vpn appliance 100scope: - version: -

Trust: 0.6

vendor:symantecmodel:gateway security 320scope: - version: -

Trust: 0.6

vendor:symantecmodel:firewall vpn appliance 200scope: - version: -

Trust: 0.6

vendor:symantecmodel:nexland pro800turbo firewall appliancescope: - version: -

Trust: 0.3

vendor:symantecmodel:nexland pro800 firewall appliancescope: - version: -

Trust: 0.3

vendor:symantecmodel:gateway securityscope:eqversion:360

Trust: 0.3

vendor:symantecmodel:gateway securityscope:eqversion:320

Trust: 0.3

vendor:symantecmodel:firewall/vpn appliance 200rscope: - version: -

Trust: 0.3

vendor:symantecmodel:firewall/vpn appliancescope:eqversion:200

Trust: 0.3

vendor:symantecmodel:firewall/vpn appliancescope:eqversion:100

Trust: 0.3

sources: CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // BID: 11237 // CNNVD: CNNVD-200412-1133 // NVD: CVE-2004-1474

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-1474
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#441078
value: 5.78

Trust: 0.8

CARNEGIE MELLON: VU#329230
value: 6.06

Trust: 0.8

CARNEGIE MELLON: VU#173910
value: 15.59

Trust: 0.8

CNNVD: CNNVD-200412-1133
value: MEDIUM

Trust: 0.6

VULHUB: VHN-9904
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-1474
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-9904
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // VULHUB: VHN-9904 // CNNVD: CNNVD-200412-1133 // NVD: CVE-2004-1474

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-1474

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200412-1133

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200412-1133

EXTERNAL IDS

db:BIDid:11237

Trust: 4.4

db:SECUNIAid:12635

Trust: 4.1

db:OSVDBid:10206

Trust: 2.5

db:CERT/CCid:VU#173910

Trust: 2.5

db:SECTRACKid:1011389

Trust: 2.4

db:NVDid:CVE-2004-1474

Trust: 1.7

db:SECTRACKid:1011388

Trust: 1.6

db:CERT/CCid:VU#441078

Trust: 0.8

db:CERT/CCid:VU#329230

Trust: 0.8

db:CNNVDid:CNNVD-200412-1133

Trust: 0.7

db:NSFOCUSid:6941

Trust: 0.6

db:NSFOCUSid:6943

Trust: 0.6

db:NSFOCUSid:6943※6942※6941

Trust: 0.6

db:NSFOCUSid:6942

Trust: 0.6

db:BUGTRAQid:20040922 MULTIPLE VULNERABILITIES IN SYMANTEC ENTERPRISE FIREWALL/GATEWAY SECURITY PRODUCTS

Trust: 0.6

db:XFid:17471

Trust: 0.6

db:VULHUBid:VHN-9904

Trust: 0.1

sources: CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // VULHUB: VHN-9904 // BID: 11237 // CNNVD: CNNVD-200412-1133 // NVD: CVE-2004-1474

REFERENCES

url:http://www.securityfocus.com/bid/11237

Trust: 4.1

url:http://www.sarc.com/avcenter/security/content/2004.09.22.html

Trust: 2.4

url:http://www.rigelksecurity.com/services/svcs_sec_advis.html

Trust: 2.4

url:http://secunia.com/advisories/12635/

Trust: 2.4

url:http://www.securitytracker.com/alerts/2004/sep/1011389.html

Trust: 2.4

url:http://securityresponse.symantec.com/avcenter/security/content/2004.09.22.html

Trust: 2.0

url:http://www.kb.cert.org/vuls/id/173910

Trust: 1.7

url:http://www.osvdb.org/10206

Trust: 1.7

url:http://secunia.com/advisories/12635

Trust: 1.7

url:http://www.securitytracker.com/alerts/2004/sep/1011388.html

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/17471

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=109588376426070&w=2

Trust: 1.0

url:http://www.osvdb.org/displayvuln.php?osvdb_id=10206

Trust: 0.8

url:http://marc.theaimsgroup.com/?l=bugtraq&m=109588376426070&w=2

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/17471

Trust: 0.6

url:http://www.nsfocus.net/vulndb/6943※6942※6941

Trust: 0.6

url:http://www.symantec.com/techsupp

Trust: 0.3

url:http://enterprisesecurity.symantec.com/products/products.cfm?productid=133&eid=0

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:/archive/1/376029

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=109588376426070&w=2

Trust: 0.1

sources: CERT/CC: VU#441078 // CERT/CC: VU#329230 // CERT/CC: VU#173910 // VULHUB: VHN-9904 // BID: 11237 // CNNVD: CNNVD-200412-1133 // NVD: CVE-2004-1474

CREDITS

Mike Sues※ msues@rigelksecurity.com

Trust: 0.6

sources: CNNVD: CNNVD-200412-1133

SOURCES

db:CERT/CCid:VU#441078
db:CERT/CCid:VU#329230
db:CERT/CCid:VU#173910
db:VULHUBid:VHN-9904
db:BIDid:11237
db:CNNVDid:CNNVD-200412-1133
db:NVDid:CVE-2004-1474

LAST UPDATE DATE

2024-08-14T14:00:44.860000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#441078date:2004-10-20T00:00:00
db:CERT/CCid:VU#329230date:2004-10-20T00:00:00
db:CERT/CCid:VU#173910date:2004-10-20T00:00:00
db:VULHUBid:VHN-9904date:2017-07-11T00:00:00
db:BIDid:11237date:2004-09-22T00:00:00
db:CNNVDid:CNNVD-200412-1133date:2005-10-20T00:00:00
db:NVDid:CVE-2004-1474date:2017-07-11T01:31:03.917

SOURCES RELEASE DATE

db:CERT/CCid:VU#441078date:2004-10-20T00:00:00
db:CERT/CCid:VU#329230date:2004-10-20T00:00:00
db:CERT/CCid:VU#173910date:2004-10-20T00:00:00
db:VULHUBid:VHN-9904date:2004-12-31T00:00:00
db:BIDid:11237date:2004-09-22T00:00:00
db:CNNVDid:CNNVD-200412-1133date:2004-09-22T00:00:00
db:NVDid:CVE-2004-1474date:2004-12-31T05:00:00