Vulnerabilities > CVE-2000-0437 - Unspecified vulnerability in Network Associates Gauntlet Firewall, Webshield and Webshield E-Ppliance
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in the CyberPatrol daemon "cyberdaemon" used in gauntlet and WebShield allows remote attackers to cause a denial of service or execute arbitrary commands.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 | |
Hardware | 2 |
Exploit-Db
description | Gauntlet Firewall 4.1/4.2/5.0,WebShield E-ppliance 100.0/300.0,IRIX 6.5.x Remote Buffer Overflow. CVE-2000-0437 . Remote exploit for irix platform |
id | EDB-ID:19949 |
last seen | 2016-02-02 |
modified | 2000-05-18 |
published | 2000-05-18 |
reporter | _Gramble_ |
source | https://www.exploit-db.com/download/19949/ |
title | Gauntlet Firewall 4.1/4.2/5.0,WebShield E-ppliance 100.0/300.0,IRIX 6.5.x - Remote Buffer Overflow |
Nessus
NASL family | Gain a shell remotely |
NASL id | GAUNTLET_OVERFLOW.NASL |
description | The remote host is running Network Associated Gauntlet firewall. The installed version of the software is vulnerable to a buffer overflow. An attacker could exploit this flaw in order to remotely execute arbitrary commands on the affected host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10420 |
published | 2000-05-25 |
reporter | This script is Copyright (C) 2000-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10420 |
title | Gauntlet CyberPatrol Content Monitoring System Overflow |
code |
|