First published: Mon Oct 28 2002(Updated: )
The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Enterprise Firewall | =6.5.2 | |
Symantec Enterprise Firewall | =7.0 | |
Symantec Enterprise Firewall | =7.0 | |
Axent Raptor Firewall | =6.5 | |
Axent Raptor Firewall | =6.5.3 | |
Symantec Velociraptor | =500 | |
Symantec Velociraptor | =700 | |
Symantec Velociraptor | =1000 | |
Symantec Velociraptor | =1100 | |
Symantec Velociraptor | =1200 | |
Symantec Velociraptor | =1300 | |
Symantec Gateway Security | =5110 | |
Symantec Gateway Security | =5200 | |
Symantec Gateway Security | =5300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0990 has a high severity rating due to its potential to cause a denial of service through connection resource exhaustion.
To mitigate CVE-2002-0990, apply patches provided by Symantec for affected firewall and gateway security products.
CVE-2002-0990 affects Symantec Enterprise Firewall, Raptor Firewall, VelociRaptor, and Symantec Gateway Security versions 6.5.2 through 7.0.
CVE-2002-0990 enables attackers to perform a denial of service attack by exhausting connection resources.
Yes, exploiting CVE-2002-0990 requires only the ability to send multiple connection requests to the vulnerable system.