Vulnerabilities > CVE-2004-1473 - Remote vulnerability in Symantec Enterprise Firewall/VPN Appliance

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
symantec
nessus

Summary

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.

Nessus

NASL familyFirewalls
NASL idKERIO_PF_UDPBYPASS.NASL
descriptionIt is possible to bypass the rules of the remote firewall by sending UDP packets with a source port equal to 53. An attacker may use this flaw to inject UDP packets to the remote hosts, in spite of the presence of a firewall.
last seen2020-06-01
modified2020-06-02
plugin id11580
published2003-05-06
reporterThis script is Copyright (C) 2003-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11580
titleFirewall UDP Packet Source Port 53 Ruleset Bypass