[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2004-1473Date: (C)2004-12-31   (M)2023-12-22


Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
OSVDB-10205
BID-11237
SECUNIA-12635
http://marc.info/?l=bugtraq&m=109588376426070&w=2
VU#329230
http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html
symantec-udp-obtain-info(17470)

CPE    12
cpe:/h:symantec:nexland_wavebase_firewall_appliance
cpe:/h:symantec:nexland_pro400_firewall_appliance
cpe:/h:symantec:nexland_isb_soho_firewall_appliance
cpe:/h:symantec:gateway_security_320
...

© SecPod Technologies