ID

VAR-200505-0030


CVE

CVE-2005-0618


TITLE

Symantec Gateway Security SMTP Data breach vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200505-369

DESCRIPTION

The SMTP binding function in Symantec Firewall/VPN Appliance 200/200R firmware after 1.5Z and before 1.68, Gateway Security 360/360R and 460/460R firmware before vuild 858, and Nexland Pro800turbo, when configured for load balancing between two WANs, might send SMTP traffic to a trusted network through an untrusted network. Symantec Gateway Security is reported prone to a vulnerability that may result in the leakage of potentially sensitive SMTP data. It is reported that this issue manifests when an affected appliance is configured to load-balance two WAN network connections and SMTP binding is configured for a single WAN interface. This may result in SMTP data leakage in deployments where one WAN interface is trusted and the other is not. SMTP traffic bound to the trusted WAN interface is load-balanced onto the untrusted WAN. ---------------------------------------------------------------------- Monitor, Filter, and Manage Security Information - Filtering and Management of Secunia advisories - Overview, documentation, and detailed reports - Alerting via email and SMS Request Trial: https://ca.secunia.com/?f=l ---------------------------------------------------------------------- TITLE: Symantec Firewall Devices SMTP Binding Configuration Bypass SECUNIA ADVISORY ID: SA14428 VERIFY ADVISORY: http://secunia.com/advisories/14428/ CRITICAL: Less critical IMPACT: Exposure of sensitive information WHERE: >From remote OPERATING SYSTEM: Symantec Firewall/VPN Appliance 100/200/200R http://secunia.com/product/552/ Symantec Gateway Security 2.x http://secunia.com/product/3104/ Symantec Nexland Firewall Appliances 1.x http://secunia.com/product/4466/ DESCRIPTION: Arthur Hagen has reported a security issue in various Symantec firewall devices, which may disclose sensitive information to malicious people. The problem is caused due to an error in the SMTP binding functionality of certain devices with ISP load-balancing capabilities. The security issue has been reported in the following versions: * Symantec Firewall/VPN Appliance 200/200R (firmware builds prior to build 1.68 and later than 1.5Z) * Symantec Gateway Security 360/360R (firmware builds prior to build 858) * Symantec Gateway Security 460/460R (firmware builds prior to build 858) * Nexland Pro800turbo (firmware builds prior to build 1.6X and later than 1.5Z) SOLUTION: The vendor has issued updated firmware releases. http://www.symantec.com/techsupp Symantec Firewall/VPN Appliance models 200 and 200R: Update to build 1.68. Symantec Gateway Security Appliance 300 and 400 series: Update to build 858. Nexland Pro800turbo: Update to build 1.6X. PROVIDED AND/OR DISCOVERED BY: Arthur Hagen ORIGINAL ADVISORY: http://securityresponse.symantec.com/avcenter/security/Content/2005.02.28.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-0618 // BID: 12654 // VULHUB: VHN-11827 // PACKETSTORM: 36389

AFFECTED PRODUCTS

vendor:symantecmodel:gateway security 360scope:lteversion:857

Trust: 1.0

vendor:symantecmodel:gateway security 460scope:lteversion:857

Trust: 1.0

vendor:nexlandmodel:pro800turboscope:eqversion:*

Trust: 1.0

vendor:symantecmodel:firewall vpn appliance 200rscope:eqversion:*

Trust: 1.0

vendor:nexlandmodel:pro800turboscope: - version: -

Trust: 0.6

vendor:symantecmodel:nexland pro800turbo firewall appliancescope: - version: -

Trust: 0.3

vendor:symantecmodel:gateway security 460rscope: - version: -

Trust: 0.3

vendor:symantecmodel:gateway securityscope:eqversion:460

Trust: 0.3

vendor:symantecmodel:gateway security 360rscope: - version: -

Trust: 0.3

vendor:symantecmodel:gateway securityscope:eqversion:360

Trust: 0.3

vendor:symantecmodel:firewall/vpn appliance 200rscope: - version: -

Trust: 0.3

vendor:symantecmodel:firewall/vpn appliancescope:eqversion:200

Trust: 0.3

vendor:symantecmodel:velociraptorscope:neversion:1.5

Trust: 0.3

vendor:symantecmodel:nexland wavebase firewall appliancescope:neversion: -

Trust: 0.3

vendor:symantecmodel:nexland pro800 firewall appliancescope:neversion: -

Trust: 0.3

vendor:symantecmodel:nexland pro400 firewall appliancescope:neversion: -

Trust: 0.3

vendor:symantecmodel:nexland pro100 firewall appliancescope:neversion: -

Trust: 0.3

vendor:symantecmodel:nexland isb soho firewall appliancescope:neversion: -

Trust: 0.3

vendor:symantecmodel:gateway securityscope:neversion:54002.0

Trust: 0.3

vendor:symantecmodel:gateway securityscope:neversion:53001.0

Trust: 0.3

vendor:symantecmodel:gateway securityscope:neversion:4200

Trust: 0.3

vendor:symantecmodel:gateway securityscope:neversion:320

Trust: 0.3

vendor:symantecmodel:firewall/vpn appliancescope:neversion:100

Trust: 0.3

vendor:symantecmodel:enterprise firewall solarisscope:neversion:8.0

Trust: 0.3

vendor:symantecmodel:enterprise firewall nt/2000scope:neversion:8.0

Trust: 0.3

vendor:symantecmodel:enterprise firewall solarisscope:neversion:7.0.4

Trust: 0.3

vendor:symantecmodel:enterprise firewall nt/2000scope:neversion:7.0.4

Trust: 0.3

vendor:symantecmodel:enterprise firewall solarisscope:neversion:7.0

Trust: 0.3

vendor:symantecmodel:enterprise firewall nt/2000scope:neversion:7.0

Trust: 0.3

sources: BID: 12654 // CNNVD: CNNVD-200505-369 // NVD: CVE-2005-0618

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-0618
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200505-369
value: MEDIUM

Trust: 0.6

VULHUB: VHN-11827
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-0618
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-11827
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-11827 // CNNVD: CNNVD-200505-369 // NVD: CVE-2005-0618

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-0618

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200505-369

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200505-369

EXTERNAL IDS

db:NVDid:CVE-2005-0618

Trust: 2.0

db:SECUNIAid:14428

Trust: 1.8

db:CNNVDid:CNNVD-200505-369

Trust: 0.7

db:BIDid:12654

Trust: 0.4

db:VULHUBid:VHN-11827

Trust: 0.1

db:PACKETSTORMid:36389

Trust: 0.1

sources: VULHUB: VHN-11827 // BID: 12654 // PACKETSTORM: 36389 // CNNVD: CNNVD-200505-369 // NVD: CVE-2005-0618

REFERENCES

url:http://securityresponse.symantec.com/avcenter/security/content/2005.02.28.html

Trust: 2.1

url:http://secunia.com/advisories/14428

Trust: 1.7

url:http://secunia.com/product/3104/

Trust: 0.1

url:http://secunia.com/product/4466/

Trust: 0.1

url:http://www.symantec.com/techsupp

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/552/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/14428/

Trust: 0.1

url:https://ca.secunia.com/?f=l

Trust: 0.1

sources: VULHUB: VHN-11827 // BID: 12654 // PACKETSTORM: 36389 // CNNVD: CNNVD-200505-369 // NVD: CVE-2005-0618

CREDITS

Discovery of this vulnerability is credited to Arthur Hagen of Broomstick Net Services.

Trust: 0.9

sources: BID: 12654 // CNNVD: CNNVD-200505-369

SOURCES

db:VULHUBid:VHN-11827
db:BIDid:12654
db:PACKETSTORMid:36389
db:CNNVDid:CNNVD-200505-369
db:NVDid:CVE-2005-0618

LAST UPDATE DATE

2024-08-14T14:00:41.908000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-11827date:2008-09-05T00:00:00
db:BIDid:12654date:2009-07-12T10:56:00
db:CNNVDid:CNNVD-200505-369date:2005-10-20T00:00:00
db:NVDid:CVE-2005-0618date:2008-09-05T20:46:49.427

SOURCES RELEASE DATE

db:VULHUBid:VHN-11827date:2005-05-02T00:00:00
db:BIDid:12654date:2005-02-28T00:00:00
db:PACKETSTORMid:36389date:2005-03-01T21:36:29
db:CNNVDid:CNNVD-200505-369date:2005-05-02T00:00:00
db:NVDid:CVE-2005-0618date:2005-05-02T04:00:00