First published: Wed Jul 03 2002(Updated: )
FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Enterprise Firewall | =6.5.2 | |
Symantec Enterprise Firewall | =7.0 | |
Symantec Enterprise Firewall | =7.0 | |
Axent Raptor Firewall | =6.5 | |
Axent Raptor Firewall | =6.5.3 | |
Symantec Velociraptor | =1.x | |
Symantec Gateway Security | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0538 is classified as a medium severity vulnerability due to the potential for unauthorized data redirection.
To mitigate CVE-2002-0538, update to the latest version of Symantec Raptor Firewall and Enterprise Firewall, as newer versions address this vulnerability.
The primary impact of CVE-2002-0538 is the potential for remote attackers to redirect FTP data connections to arbitrary ports.
CVE-2002-0538 affects Symantec Raptor Firewall versions 6.5.3 and 6.5, as well as Symantec Enterprise Firewall versions 6.5.2 and 7.0.
Yes, CVE-2002-0538 can be exploited remotely by attackers leveraging the FTP proxy vulnerability.