ID

VAR-200412-0318


CVE

CVE-2004-2472


TITLE

Agnitum Outpost Firewall Remote service denial vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200412-975

DESCRIPTION

Agnitum Outpost Pro Firewall 2.1 allows remote attackers to cause a denial of service (CPU consumption) via a flood of small, invalid packets, which can not be processed quickly enough by Outpost Pro. The issue is reported to present itself when an attacker sends multiple incomplete requests to the application. Agnitum Outpost Pro Firewall version 2.1 is reported to be affected by this issue, however, prior versions may be vulnerable as well. The problem is that the firewall fails to handle incomplete requests fast enough, if they are made at a high speed with random source IPs. This causes the firewall to stop processing packets in real time. SOLUTION: Use another product if this causes problems. PROVIDED AND/OR DISCOVERED BY: Armin Pelkmann ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2004-2472 // BID: 10338 // VULHUB: VHN-10900 // PACKETSTORM: 33332

AFFECTED PRODUCTS

vendor:agnitummodel:outpost firewallscope:eqversion:2.1

Trust: 1.9

sources: BID: 10338 // CNNVD: CNNVD-200412-975 // NVD: CVE-2004-2472

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-2472
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200412-975
value: MEDIUM

Trust: 0.6

VULHUB: VHN-10900
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-2472
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-10900
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-10900 // CNNVD: CNNVD-200412-975 // NVD: CVE-2004-2472

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-2472

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200412-975

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200412-975

EXTERNAL IDS

db:BIDid:10338

Trust: 2.0

db:SECUNIAid:11601

Trust: 1.8

db:OSVDBid:6110

Trust: 1.7

db:SECTRACKid:1010151

Trust: 1.7

db:NVDid:CVE-2004-2472

Trust: 1.7

db:CNNVDid:CNNVD-200412-975

Trust: 0.7

db:XFid:16133

Trust: 0.6

db:VULHUBid:VHN-10900

Trust: 0.1

db:PACKETSTORMid:33332

Trust: 0.1

sources: VULHUB: VHN-10900 // BID: 10338 // PACKETSTORM: 33332 // CNNVD: CNNVD-200412-975 // NVD: CVE-2004-2472

REFERENCES

url:http://www.securityfocus.com/bid/10338

Trust: 1.7

url:http://www.securiteam.com/windowsntfocus/5fp0e0kcuw.html

Trust: 1.7

url:http://www.osvdb.org/6110

Trust: 1.7

url:http://securitytracker.com/alerts/2004/may/1010151.html

Trust: 1.7

url:http://secunia.com/advisories/11601

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/16133

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/16133

Trust: 0.6

url:http://www.agnitum.com/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/11601/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-10900 // BID: 10338 // PACKETSTORM: 33332 // CNNVD: CNNVD-200412-975 // NVD: CVE-2004-2472

CREDITS

Discovery is credited to Armin Pelkmann.

Trust: 0.9

sources: BID: 10338 // CNNVD: CNNVD-200412-975

SOURCES

db:VULHUBid:VHN-10900
db:BIDid:10338
db:PACKETSTORMid:33332
db:CNNVDid:CNNVD-200412-975
db:NVDid:CVE-2004-2472

LAST UPDATE DATE

2024-08-14T14:00:44.158000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-10900date:2017-07-11T00:00:00
db:BIDid:10338date:2004-05-13T00:00:00
db:CNNVDid:CNNVD-200412-975date:2005-10-20T00:00:00
db:NVDid:CVE-2004-2472date:2017-07-11T01:31:55.670

SOURCES RELEASE DATE

db:VULHUBid:VHN-10900date:2004-12-31T00:00:00
db:BIDid:10338date:2004-05-13T00:00:00
db:PACKETSTORMid:33332date:2004-05-13T23:21:44
db:CNNVDid:CNNVD-200412-975date:2004-12-31T00:00:00
db:NVDid:CVE-2004-2472date:2004-12-31T05:00:00