CVE-2004-1473

critical

Description

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/17470

http://www.securityfocus.com/bid/11237

http://www.osvdb.org/10205

http://www.kb.cert.org/vuls/id/329230

http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html

http://secunia.com/advisories/12635

http://marc.info/?l=bugtraq&m=109588376426070&w=2

Details

Source: Mitre, NVD

Published: 2004-12-31

Updated: 2017-07-11

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical