ID

VAR-200605-0112


CVE

CVE-2006-2341


TITLE

Symantec Enterprise Firewall Inside IP Address disclosure vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2006-000277

DESCRIPTION

The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI. Symantec Enterprise Firewall and Gateway Security products are prone to an information-disclosure weakness. The vendor has reported that the NAT/HTTP proxy component of the products may reveal the internal IP addresses of protected computers. An attacker may use this information to carry out targeted attacks against a potentially vulnerable host. The weakness is caused due to an error when generating responses to certain HTTP requests. SOLUTION: Apply product updates. http://www.symantec.com/techsupp/enterprise/select_product_updates.html PROVIDED AND/OR DISCOVERED BY: The vendor credits Bernhard Mueller. ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-2341 // JVNDB: JVNDB-2006-000277 // BID: 17936 // VULHUB: VHN-18449 // PACKETSTORM: 46250

AFFECTED PRODUCTS

vendor:symantecmodel:enterprise firewallscope:eqversion:8.0

Trust: 2.7

vendor:symantecmodel:gateway securityscope:eqversion:5000_series_2.0.1

Trust: 1.6

vendor:symantecmodel:gateway securityscope:eqversion:3.0

Trust: 1.6

vendor:symantecmodel:gateway securityscope:eqversion:5000_series_3.0

Trust: 1.6

vendor:symantecmodel:gateway securityscope:eqversion:2.0.1

Trust: 1.6

vendor:symantecmodel:gateway security seriesscope:eqversion:50003.0

Trust: 0.3

vendor:symantecmodel:gateway security seriesscope:eqversion:50002.0.1

Trust: 0.3

vendor:symantecmodel:gateway security seriesscope:neversion:50003.0.1

Trust: 0.3

vendor:symantecmodel:gateway security appliancescope:neversion:16003.0

Trust: 0.3

sources: BID: 17936 // JVNDB: JVNDB-2006-000277 // CNNVD: CNNVD-200605-225 // NVD: CVE-2006-2341

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2341
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-2341
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200605-225
value: MEDIUM

Trust: 0.6

VULHUB: VHN-18449
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-2341
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-18449
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18449 // JVNDB: JVNDB-2006-000277 // CNNVD: CNNVD-200605-225 // NVD: CVE-2006-2341

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

sources: VULHUB: VHN-18449 // NVD: CVE-2006-2341

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200605-225

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200605-225

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000277

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-18449

PATCH

title:SYM06-009url:http://www.symantec.com/region/jp/avcenter/security/content/2006.05.10.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-000277

EXTERNAL IDS

db:NVDid:CVE-2006-2341

Trust: 2.5

db:BIDid:17936

Trust: 2.0

db:SECUNIAid:20082

Trust: 1.8

db:VUPENid:ADV-2006-1764

Trust: 1.7

db:SECTRACKid:1016058

Trust: 1.7

db:SECTRACKid:1016057

Trust: 1.7

db:JVNDBid:JVNDB-2006-000277

Trust: 0.8

db:CNNVDid:CNNVD-200605-225

Trust: 0.7

db:BUGTRAQid:20060512 SEC CONSULT SA-20060512-0 :: SYMANTEC ENTERPRISE FIREWALL NAT/HTTP PROXY PRIVATE IP EXPOSURE

Trust: 0.6

db:XFid:26370

Trust: 0.6

db:EXPLOIT-DBid:27852

Trust: 0.1

db:SEEBUGid:SSVID-81443

Trust: 0.1

db:VULHUBid:VHN-18449

Trust: 0.1

db:PACKETSTORMid:46250

Trust: 0.1

sources: VULHUB: VHN-18449 // BID: 17936 // JVNDB: JVNDB-2006-000277 // PACKETSTORM: 46250 // CNNVD: CNNVD-200605-225 // NVD: CVE-2006-2341

REFERENCES

url:http://securityresponse.symantec.com/avcenter/security/content/2006.05.10.html

Trust: 2.1

url:http://www.securityfocus.com/bid/17936

Trust: 1.7

url:http://securitytracker.com/id?1016057

Trust: 1.7

url:http://securitytracker.com/id?1016058

Trust: 1.7

url:http://secunia.com/advisories/20082

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2006/1764

Trust: 1.4

url:http://www.securityfocus.com/archive/1/433876/30/5040/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/1764

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26370

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2341

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-2341

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/26370

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/433876/30/5040/threaded

Trust: 0.6

url:http://www.symantec.com/techsupp/enterprise/select_product_updates.html

Trust: 0.4

url:http://www.sec-consult.com/261.html

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:/archive/1/433876

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/9881/

Trust: 0.1

url:http://secunia.com/product/3587/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6648/

Trust: 0.1

url:http://secunia.com/advisories/20082/

Trust: 0.1

sources: VULHUB: VHN-18449 // BID: 17936 // JVNDB: JVNDB-2006-000277 // PACKETSTORM: 46250 // CNNVD: CNNVD-200605-225 // NVD: CVE-2006-2341

CREDITS

Bernhard Mueller research@sec-consult.com

Trust: 0.6

sources: CNNVD: CNNVD-200605-225

SOURCES

db:VULHUBid:VHN-18449
db:BIDid:17936
db:JVNDBid:JVNDB-2006-000277
db:PACKETSTORMid:46250
db:CNNVDid:CNNVD-200605-225
db:NVDid:CVE-2006-2341

LAST UPDATE DATE

2024-08-14T14:00:21.044000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18449date:2018-10-18T00:00:00
db:BIDid:17936date:2006-05-15T17:59:00
db:JVNDBid:JVNDB-2006-000277date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200605-225date:2013-01-08T00:00:00
db:NVDid:CVE-2006-2341date:2018-10-18T16:39:25.867

SOURCES RELEASE DATE

db:VULHUBid:VHN-18449date:2006-05-12T00:00:00
db:BIDid:17936date:2006-05-10T00:00:00
db:JVNDBid:JVNDB-2006-000277date:2007-04-01T00:00:00
db:PACKETSTORMid:46250date:2006-05-17T05:39:52
db:CNNVDid:CNNVD-200605-225date:2006-05-11T00:00:00
db:NVDid:CVE-2006-2341date:2006-05-12T01:02:00