VAR-200605-0112
Vulnerability from variot - Updated: 2023-12-18 14:02The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI. Symantec Enterprise Firewall and Gateway Security products are prone to an information-disclosure weakness. The vendor has reported that the NAT/HTTP proxy component of the products may reveal the internal IP addresses of protected computers. An attacker may use this information to carry out targeted attacks against a potentially vulnerable host.
The weakness is caused due to an error when generating responses to certain HTTP requests.
SOLUTION: Apply product updates. http://www.symantec.com/techsupp/enterprise/select_product_updates.html
PROVIDED AND/OR DISCOVERED BY: The vendor credits Bernhard Mueller.
ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200605-0112",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "enterprise firewall",
"scope": "eq",
"trust": 2.7,
"vendor": "symantec",
"version": "8.0"
},
{
"model": "gateway security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "2.0.1"
},
{
"model": "gateway security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "3.0"
},
{
"model": "gateway security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "5000_series_3.0"
},
{
"model": "gateway security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "5000_series_2.0.1"
},
{
"model": "gateway security series",
"scope": "eq",
"trust": 0.3,
"vendor": "symantec",
"version": "50003.0"
},
{
"model": "gateway security series",
"scope": "eq",
"trust": 0.3,
"vendor": "symantec",
"version": "50002.0.1"
},
{
"model": "gateway security series",
"scope": "ne",
"trust": 0.3,
"vendor": "symantec",
"version": "50003.0.1"
},
{
"model": "gateway security appliance",
"scope": "ne",
"trust": 0.3,
"vendor": "symantec",
"version": "16003.0"
}
],
"sources": [
{
"db": "BID",
"id": "17936"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000277"
},
{
"db": "NVD",
"id": "CVE-2006-2341"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:symantec:gateway_security:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:gateway_security:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:enterprise_firewall:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:symantec:gateway_security:5000_series_2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:symantec:gateway_security:5000_series_3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2341"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Bernhard Mueller research@sec-consult.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
],
"trust": 0.6
},
"cve": "CVE-2006-2341",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2006-2341",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-18449",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2006-2341",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200605-225",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-18449",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18449"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000277"
},
{
"db": "NVD",
"id": "CVE-2006-2341"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI. Symantec Enterprise Firewall and Gateway Security products are prone to an information-disclosure weakness. \nThe vendor has reported that the NAT/HTTP proxy component of the products may reveal the internal IP addresses of protected computers. \nAn attacker may use this information to carry out targeted attacks against a potentially vulnerable host. \n\nThe weakness is caused due to an error when generating responses to\ncertain HTTP requests. \n\nSOLUTION:\nApply product updates. \nhttp://www.symantec.com/techsupp/enterprise/select_product_updates.html\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Bernhard Mueller. \n\nORIGINAL ADVISORY:\nSymantec:\nhttp://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2341"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000277"
},
{
"db": "BID",
"id": "17936"
},
{
"db": "VULHUB",
"id": "VHN-18449"
},
{
"db": "PACKETSTORM",
"id": "46250"
}
],
"trust": 2.07
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-18449",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18449"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2006-2341",
"trust": 2.5
},
{
"db": "BID",
"id": "17936",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "20082",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2006-1764",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1016058",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1016057",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000277",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200605-225",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "20060512 SEC CONSULT SA-20060512-0 :: SYMANTEC ENTERPRISE FIREWALL NAT/HTTP PROXY PRIVATE IP EXPOSURE",
"trust": 0.6
},
{
"db": "XF",
"id": "26370",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "27852",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-81443",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-18449",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "46250",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18449"
},
{
"db": "BID",
"id": "17936"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000277"
},
{
"db": "PACKETSTORM",
"id": "46250"
},
{
"db": "NVD",
"id": "CVE-2006-2341"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
]
},
"id": "VAR-200605-0112",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-18449"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T14:02:42.808000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SYM06-009",
"trust": 0.8,
"url": "http://www.symantec.com/region/jp/avcenter/security/content/2006.05.10.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-000277"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18449"
},
{
"db": "NVD",
"id": "CVE-2006-2341"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://securityresponse.symantec.com/avcenter/security/content/2006.05.10.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/17936"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1016057"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1016058"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/20082"
},
{
"trust": 1.4,
"url": "http://www.frsirt.com/english/advisories/2006/1764"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/433876/30/5040/threaded"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2006/1764"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26370"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2341"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-2341"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/26370"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/433876/30/5040/threaded"
},
{
"trust": 0.4,
"url": "http://www.symantec.com/techsupp/enterprise/select_product_updates.html"
},
{
"trust": 0.3,
"url": "http://www.sec-consult.com/261.html"
},
{
"trust": 0.3,
"url": "http://www.symantec.com"
},
{
"trust": 0.3,
"url": "/archive/1/433876"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/9881/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/3587/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/6648/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/20082/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18449"
},
{
"db": "BID",
"id": "17936"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000277"
},
{
"db": "PACKETSTORM",
"id": "46250"
},
{
"db": "NVD",
"id": "CVE-2006-2341"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-18449"
},
{
"db": "BID",
"id": "17936"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000277"
},
{
"db": "PACKETSTORM",
"id": "46250"
},
{
"db": "NVD",
"id": "CVE-2006-2341"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-05-12T00:00:00",
"db": "VULHUB",
"id": "VHN-18449"
},
{
"date": "2006-05-10T00:00:00",
"db": "BID",
"id": "17936"
},
{
"date": "2007-04-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-000277"
},
{
"date": "2006-05-17T05:39:52",
"db": "PACKETSTORM",
"id": "46250"
},
{
"date": "2006-05-12T01:02:00",
"db": "NVD",
"id": "CVE-2006-2341"
},
{
"date": "2006-05-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-18T00:00:00",
"db": "VULHUB",
"id": "VHN-18449"
},
{
"date": "2006-05-15T17:59:00",
"db": "BID",
"id": "17936"
},
{
"date": "2007-04-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-000277"
},
{
"date": "2018-10-18T16:39:25.867000",
"db": "NVD",
"id": "CVE-2006-2341"
},
{
"date": "2013-01-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Symantec Enterprise Firewall Inside IP Address disclosure vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-000277"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200605-225"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.