All the vulnerabilites related to symantec - raptor_firewall
cve-2002-1463
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:26
Severity ?
EPSS score ?
Summary
Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2002-07/0492.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/5387 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/12836 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/855 | vdb-entry, x_refsource_OSVDB | |
http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020802 Security Advisory: Raptor Firewall Weak ISN Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0492.html" }, { "name": "5387", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5387" }, { "name": "symantec-tcp-seq-predict(12836)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12836" }, { "name": "855", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/855" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-08-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-08-18T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020802 Security Advisory: Raptor Firewall Weak ISN Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0492.html" }, { "name": "5387", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5387" }, { "name": "symantec-tcp-seq-predict(12836)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12836" }, { "name": "855", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/855" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1463", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020802 Security Advisory: Raptor Firewall Weak ISN Vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0492.html" }, { "name": "5387", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5387" }, { "name": "symantec-tcp-seq-predict(12836)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12836" }, { "name": "855", "refsource": "OSVDB", "url": "http://www.osvdb.org/855" }, { "name": "http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1463", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2003-02-05T00:00:00", "dateUpdated": "2024-08-08T03:26:28.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1535
Vulnerability from cvelistv5
Published
2003-03-18 05:00
Modified
2024-08-08 03:26
Severity ?
EPSS score ?
Summary
Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/5959 | vdb-entry, x_refsource_BID | |
http://www.iss.net/security_center/static/10363.php | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html | mailing-list, x_refsource_BUGTRAQ | |
http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "5959", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5959" }, { "name": "simple-webserver-topology-disclosure(10363)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10363.php" }, { "name": "20021014 Symantec Enterprise Firewall Secure Webserver info leak", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-10-16T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "5959", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5959" }, { "name": "simple-webserver-topology-disclosure(10363)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10363.php" }, { "name": "20021014 Symantec Enterprise Firewall Secure Webserver info leak", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "5959", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5959" }, { "name": "simple-webserver-topology-disclosure(10363)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10363.php" }, { "name": "20021014 Symantec Enterprise Firewall Secure Webserver info leak", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1535", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-02-23T00:00:00", "dateUpdated": "2024-08-08T03:26:28.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0538
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:49
Severity ?
EPSS score ?
Summary
FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/4522 | vdb-entry, x_refsource_BID | |
http://archives.neohapsis.com/archives/bugtraq/2002-04/0166.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.iss.net/security_center/static/8847.php | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/bugtraq/2002-04/0224.html | mailing-list, x_refsource_BUGTRAQ | |
http://securityresponse.symantec.com/avcenter/security/Content/2002.04.17.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:49:28.883Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4522", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4522" }, { "name": "20020415 Raptor Firewall FTP Bounce vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0166.html" }, { "name": "raptor-firewall-ftp-bounce(8847)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/8847.php" }, { "name": "20020417 Re: Raptor Firewall FTP Bounce vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0224.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.04.17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-04-15T00:00:00", "descriptions": [ { "lang": "en", "value": "FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server\u0027s \"FTP PORT\" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the \"FTP bounce\" vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-06-15T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4522", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4522" }, { "name": "20020415 Raptor Firewall FTP Bounce vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0166.html" }, { "name": "raptor-firewall-ftp-bounce(8847)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/8847.php" }, { "name": "20020417 Re: Raptor Firewall FTP Bounce vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0224.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.04.17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0538", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server\u0027s \"FTP PORT\" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the \"FTP bounce\" vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4522", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4522" }, { "name": "20020415 Raptor Firewall FTP Bounce vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0166.html" }, { "name": "raptor-firewall-ftp-bounce(8847)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/8847.php" }, { "name": "20020417 Re: Raptor Firewall FTP Bounce vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0224.html" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2002.04.17.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.04.17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0538", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:49:28.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0990
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:12
Severity ?
EPSS score ?
Summary
The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/10364.php | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=103463869503124&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/5958 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:12:16.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "simple-webserver-url-dos(10364)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10364.php" }, { "name": "20021014 Multiple Symantec Firewall Secure Webserver timeout DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103463869503124\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11.html" }, { "name": "5958", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5958" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "simple-webserver-url-dos(10364)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10364.php" }, { "name": "20021014 Multiple Symantec Firewall Secure Webserver timeout DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103463869503124\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11.html" }, { "name": "5958", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5958" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "simple-webserver-url-dos(10364)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10364.php" }, { "name": "20021014 Multiple Symantec Firewall Secure Webserver timeout DoS", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103463869503124\u0026w=2" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11.html" }, { "name": "5958", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5958" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0990", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-08-27T00:00:00", "dateUpdated": "2024-08-08T03:12:16.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0483
Vulnerability from cvelistv5
Published
2001-05-24 04:00
Modified
2024-08-08 04:21
Severity ?
EPSS score ?
Summary
Configuration error in Axent Raptor Firewall 6.5 allows remote attackers to use the firewall as a proxy to access internal web resources when the http.noproxy Rule is not set.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/171953 | mailing-list, x_refsource_BUGTRAQ | |
http://archives.neohapsis.com/archives/bugtraq/2001-03/0359.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/2517 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:21:38.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20010327 RE: Raptor 6.5 http vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/171953" }, { "name": "20010324 Raptor 6.5 http vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0359.html" }, { "name": "2517", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2517" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Configuration error in Axent Raptor Firewall 6.5 allows remote attackers to use the firewall as a proxy to access internal web resources when the http.noproxy Rule is not set." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-05-08T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20010327 RE: Raptor 6.5 http vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/171953" }, { "name": "20010324 Raptor 6.5 http vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0359.html" }, { "name": "2517", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2517" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0483", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Configuration error in Axent Raptor Firewall 6.5 allows remote attackers to use the firewall as a proxy to access internal web resources when the http.noproxy Rule is not set." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20010327 RE: Raptor 6.5 http vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/171953" }, { "name": "20010324 Raptor 6.5 http vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0359.html" }, { "name": "2517", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2517" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0483", "datePublished": "2001-05-24T04:00:00", "dateReserved": "2001-05-24T00:00:00", "dateUpdated": "2024-08-08T04:21:38.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2294
Vulnerability from cvelistv5
Published
2007-10-18 10:00
Modified
2024-08-08 03:59
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd).
References
▼ | URL | Tags |
---|---|---|
http://www.symantec.com/avcenter/security/Content/2002.12.12.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10862 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/6389 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:59:11.399Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2002.12.12.html" }, { "name": "sef-realaudio-proxy-bo(10862)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10862" }, { "name": "6389", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6389" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-12-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2002.12.12.html" }, { "name": "sef-realaudio-proxy-bo(10862)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10862" }, { "name": "6389", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6389" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2294", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/avcenter/security/Content/2002.12.12.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2002.12.12.html" }, { "name": "sef-realaudio-proxy-bo(10862)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10862" }, { "name": "6389", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6389" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2294", "datePublished": "2007-10-18T10:00:00", "dateReserved": "2007-10-17T00:00:00", "dateUpdated": "2024-08-08T03:59:11.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2003-03-31 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | enterprise_firewall | 6.5.2 | |
symantec | raptor_firewall | 6.5 | |
symantec | raptor_firewall | 6.5.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "60CD39A5-0059-4E17-8F4F-58F23589A408", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "2678E925-06BD-4C3F-8223-93E070B4035E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "53477F8E-F387-4266-88B7-1B1022E74F2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present." }, { "lang": "es", "value": "Secure Webserver 1.1 en Raptor 6.5 y Symantec Enterprise Firewall 6.5.2 permite a atacantes remotos la identificaci\u00f3n de direcciones IP de equipos en red mediante una petici\u00f3n CONNECT, que genera un mensajes de error distinto en caso de que el equipo este presente." } ], "id": "CVE-2002-1535", "lastModified": "2024-11-20T23:41:32.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/10363.php" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5959" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/10363.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5959" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-06-18 04:00
Modified
2024-11-20 23:35
Severity ?
Summary
Configuration error in Axent Raptor Firewall 6.5 allows remote attackers to use the firewall as a proxy to access internal web resources when the http.noproxy Rule is not set.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2001-03/0359.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/171953 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/2517 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2001-03/0359.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/171953 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/2517 | Exploit, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | raptor_firewall | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "2678E925-06BD-4C3F-8223-93E070B4035E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Configuration error in Axent Raptor Firewall 6.5 allows remote attackers to use the firewall as a proxy to access internal web resources when the http.noproxy Rule is not set." } ], "id": "CVE-2001-0483", "lastModified": "2024-11-20T23:35:28.690", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-06-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0359.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/171953" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0359.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/171953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2517" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-28 05:00
Modified
2024-11-20 23:40
Severity ?
Summary
The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | enterprise_firewall | 6.5.2 | |
symantec | enterprise_firewall | 7.0 | |
symantec | enterprise_firewall | 7.0 | |
symantec | raptor_firewall | 6.5 | |
symantec | raptor_firewall | 6.5.3 | |
symantec | velociraptor | 500 | |
symantec | velociraptor | 700 | |
symantec | velociraptor | 1000 | |
symantec | velociraptor | 1100 | |
symantec | velociraptor | 1200 | |
symantec | velociraptor | 1300 | |
symantec | gateway_security | 5110 | |
symantec | gateway_security | 5200 | |
symantec | gateway_security | 5300 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:6.5.2:*:windows_2000_nt:*:*:*:*:*", "matchCriteriaId": "0306D0E7-691F-46EB-9133-F585000476A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:solaris:*:*:*:*:*", "matchCriteriaId": "8656778B-9299-436B-AF8A-64C042273751", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:windows_2000_nt:*:*:*:*:*", "matchCriteriaId": "8D5B3D26-F6FB-4D38-99B5-4AAF8C62F82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5:*:windows_nt:*:*:*:*:*", "matchCriteriaId": "D585A9BA-7F89-4382-95BB-823B83E5F222", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5.3:*:solaris:*:*:*:*:*", "matchCriteriaId": "4BBE1CA5-CDB0-4C9C-A6AB-0727C56E419F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:500:*:*:*:*:*:*:*", "matchCriteriaId": "DA052121-6694-4F90-BEE1-E5D987676A2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:700:*:*:*:*:*:*:*", "matchCriteriaId": "3F2ADA6F-769B-441F-89B0-C66DDE1C0F3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:1000:*:*:*:*:*:*:*", "matchCriteriaId": "8C1D900E-FEB4-4EA7-A88F-84607A9BBAF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:1100:*:*:*:*:*:*:*", "matchCriteriaId": "107F69B6-8CFA-44F6-B6CA-AD54B5D194E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:1200:*:*:*:*:*:*:*", "matchCriteriaId": "639A972B-4D99-4E8A-885E-930779D65125", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:1300:*:*:*:*:*:*:*", "matchCriteriaId": "849ABDDF-321F-43A3-9723-6B33907D8A52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:symantec:gateway_security:5110:*:*:*:*:*:*:*", "matchCriteriaId": "7E42EDB2-616D-4915-9E41-7D80F32E4901", "vulnerable": true }, { "criteria": "cpe:2.3:h:symantec:gateway_security:5200:*:*:*:*:*:*:*", "matchCriteriaId": "1D1175AC-9310-4804-8FB3-2F988F55BD09", "vulnerable": true }, { "criteria": "cpe:2.3:h:symantec:gateway_security:5300:*:*:*:*:*:*:*", "matchCriteriaId": "FF09575E-83D3-4772-816B-7D639B1C32A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout." }, { "lang": "es", "value": "El componente de proxy web en Symantec Enterprise Firewall (SEF) 6.5.2 a 7.0, Raptor Firewall 6.5 y 6.5.3, VelociRaptor, y Symantec Gateway Security permite a atacantes remotos causar una denegaci\u00f3n de servicio (agotamiento de recursos de conexiones) mediante m\u00faltiples peticiones de conexi\u00f3n a dominios cuyo servidor DNS no responda o no exista, lo que genera una larga espera." } ], "id": "CVE-2002-0990", "lastModified": "2024-11-20T23:40:20.483", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-28T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=103463869503124\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10364.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=103463869503124\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10364.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5958" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:43
Severity ?
Summary
Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | gateway_security | 5110_1.0 | |
symantec | gateway_security | 5200_1.0 | |
symantec | gateway_security | 5300 | |
symantec | enterprise_firewall | 6.5.2 | |
symantec | enterprise_firewall | 7.0 | |
symantec | enterprise_firewall | 7.0 | |
symantec | raptor_firewall | 6.5 | |
symantec | raptor_firewall | 6.5.3 | |
symantec | velociraptor | model_500 | |
symantec | velociraptor | model_700 | |
symantec | velociraptor | model_1000 | |
symantec | velociraptor | model_1100 | |
symantec | velociraptor | model_1200 | |
symantec | velociraptor | model_1300 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:symantec:gateway_security:5110_1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B647CBE-35DA-404C-BC71-0C378CC5CA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:symantec:gateway_security:5200_1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8EB8A732-3D37-4B96-8674-E03CC3826967", "vulnerable": false }, { "criteria": "cpe:2.3:h:symantec:gateway_security:5300:*:*:*:*:*:*:*", "matchCriteriaId": "FF09575E-83D3-4772-816B-7D639B1C32A4", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:6.5.2:*:windows_2000_nt:*:*:*:*:*", "matchCriteriaId": "0306D0E7-691F-46EB-9133-F585000476A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:solaris:*:*:*:*:*", "matchCriteriaId": "8656778B-9299-436B-AF8A-64C042273751", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:windows_2000_nt:*:*:*:*:*", "matchCriteriaId": "8D5B3D26-F6FB-4D38-99B5-4AAF8C62F82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5:*:windows_nt:*:*:*:*:*", "matchCriteriaId": "D585A9BA-7F89-4382-95BB-823B83E5F222", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5.3:*:solaris:*:*:*:*:*", "matchCriteriaId": "4BBE1CA5-CDB0-4C9C-A6AB-0727C56E419F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_500:*:*:*:*:*:*:*", "matchCriteriaId": "2BE710F1-F3AD-423B-A0DB-78D5F809D62E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_700:*:*:*:*:*:*:*", "matchCriteriaId": "A4F0486F-3101-4D7B-83C2-8E9F31802504", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_1000:*:*:*:*:*:*:*", "matchCriteriaId": "155FE168-A185-4D4D-923B-207F0B26EE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_1100:*:*:*:*:*:*:*", "matchCriteriaId": "FDB06031-2EF6-4E45-977D-F28D538FB773", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_1200:*:*:*:*:*:*:*", "matchCriteriaId": "30475DFE-D476-4A6C-B851-139E927BAA25", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_1300:*:*:*:*:*:*:*", "matchCriteriaId": "D9A2EDF6-46FF-4EF5-A37A-AAD06B9A51D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd)." } ], "id": "CVE-2002-2294", "lastModified": "2024-11-20T23:43:20.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6389" }, { "source": "cve@mitre.org", "url": "http://www.symantec.com/avcenter/security/Content/2002.12.12.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/avcenter/security/Content/2002.12.12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10862" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-03 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | enterprise_firewall | 6.5.2 | |
symantec | enterprise_firewall | 7.0 | |
symantec | enterprise_firewall | 7.0 | |
symantec | raptor_firewall | 6.5 | |
symantec | raptor_firewall | 6.5.3 | |
symantec | velociraptor | 1.x | |
symantec | gateway_security | 1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:6.5.2:*:windows_2000_nt:*:*:*:*:*", "matchCriteriaId": "0306D0E7-691F-46EB-9133-F585000476A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:solaris:*:*:*:*:*", "matchCriteriaId": "8656778B-9299-436B-AF8A-64C042273751", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:windows_2000_nt:*:*:*:*:*", "matchCriteriaId": "8D5B3D26-F6FB-4D38-99B5-4AAF8C62F82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5:*:windows_nt:*:*:*:*:*", "matchCriteriaId": "D585A9BA-7F89-4382-95BB-823B83E5F222", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5.3:*:solaris:*:*:*:*:*", "matchCriteriaId": "4BBE1CA5-CDB0-4C9C-A6AB-0727C56E419F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:1.x:*:*:*:*:*:*:*", "matchCriteriaId": "DEA864B8-61DF-465F-A021-C8D6C9CB4827", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:symantec:gateway_security:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0CAE17C6-FD3E-4846-A706-78246B37BFA1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server\u0027s \"FTP PORT\" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the \"FTP bounce\" vulnerability." } ], "id": "CVE-2002-0538", "lastModified": "2024-11-20T23:39:19.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0166.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0224.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.04.17.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8847.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0166.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0224.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.04.17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8847.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4522" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-06-09 04:00
Modified
2024-11-20 23:41
Severity ?
Summary
Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | enterprise_firewall | 6.5.2 | |
symantec | enterprise_firewall | 7.0 | |
symantec | raptor_firewall | 6.5 | |
symantec | raptor_firewall | 6.5.3 | |
symantec | velociraptor | model_500 | |
symantec | velociraptor | model_700 | |
symantec | velociraptor | model_1000 | |
symantec | velociraptor | model_1100 | |
symantec | velociraptor | model_1200 | |
symantec | velociraptor | model_1300 | |
symantec | gateway_security | 5110 | |
symantec | gateway_security | 5200 | |
symantec | gateway_security | 5300 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "60CD39A5-0059-4E17-8F4F-58F23589A408", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "55B40C3E-2794-4310-97BC-D80069992C87", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "2678E925-06BD-4C3F-8223-93E070B4035E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:raptor_firewall:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "53477F8E-F387-4266-88B7-1B1022E74F2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_500:*:*:*:*:*:*:*", "matchCriteriaId": "2BE710F1-F3AD-423B-A0DB-78D5F809D62E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_700:*:*:*:*:*:*:*", "matchCriteriaId": "A4F0486F-3101-4D7B-83C2-8E9F31802504", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_1000:*:*:*:*:*:*:*", "matchCriteriaId": "155FE168-A185-4D4D-923B-207F0B26EE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_1100:*:*:*:*:*:*:*", "matchCriteriaId": "FDB06031-2EF6-4E45-977D-F28D538FB773", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_1200:*:*:*:*:*:*:*", "matchCriteriaId": "30475DFE-D476-4A6C-B851-139E927BAA25", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:velociraptor:model_1300:*:*:*:*:*:*:*", "matchCriteriaId": "D9A2EDF6-46FF-4EF5-A37A-AAD06B9A51D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:symantec:gateway_security:5110:*:*:*:*:*:*:*", "matchCriteriaId": "7E42EDB2-616D-4915-9E41-7D80F32E4901", "vulnerable": true }, { "criteria": "cpe:2.3:h:symantec:gateway_security:5200:*:*:*:*:*:*:*", "matchCriteriaId": "1D1175AC-9310-4804-8FB3-2F988F55BD09", "vulnerable": true }, { "criteria": "cpe:2.3:h:symantec:gateway_security:5300:*:*:*:*:*:*:*", "matchCriteriaId": "FF09575E-83D3-4772-816B-7D639B1C32A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections." }, { "lang": "es", "value": "Symantec Raptor Firewall 6.5 y 6.5.3, Enterprise Firewall 6.5.2 y 7.0, VelociRaptor modelos 500/700/1000 y 1100/1200/1300, y Gateway Security 5110/5200/5300 generan secuencias num\u00e9ricas iniciales (ISN) f\u00e1cilmente predecibles, lo que permitir\u00eda a atacantes remotos falsear conexiones." } ], "id": "CVE-2002-1463", "lastModified": "2024-11-20T23:41:22.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-06-09T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0492.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/855" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5387" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0492.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12836" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }