First published: Fri Oct 04 2002(Updated: )
Dynamic VPN Configuration Protocol service (DVCP) in Watchguard Firebox firmware 5.x.x allows remote attackers to cause a denial of service (crash) via a malformed packet containing tab characters to TCP port 4110.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WatchGuard SOHO firewall | =5.0.35a | |
WatchGuard SOHO firewall | =5.0.35 | |
WatchGuard SOHO firewall | =5.0.28 | |
WatchGuard SOHO firewall | =5.0.29 | |
WatchGuard SOHO firewall | =5.0.31 | |
Watchguard Firebox | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1046 has a high severity rating due to its potential to cause a denial of service in affected systems.
To fix CVE-2002-1046, update the Watchguard Firebox firmware to a version beyond the affected versions listed in the advisory.
CVE-2002-1046 affects Watchguard Firebox firmware versions 5.0, 5.0.28, 5.0.29, 5.0.31, and 5.0.35.
CVE-2002-1046 is not permanent if appropriate patches and updates are applied to the affected Watchguard software.
Yes, CVE-2002-1046 can be exploited remotely, allowing attackers to crash the affected devices using malformed packets.