First published: Mon Jun 09 2003(Updated: )
Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Enterprise Firewall | =6.5.2 | |
Symantec Enterprise Firewall | =7.0 | |
Axent Raptor Firewall | =6.5 | |
Axent Raptor Firewall | =6.5.3 | |
Symantec Velociraptor | =model_500 | |
Symantec Velociraptor | =model_700 | |
Symantec Velociraptor | =model_1000 | |
Symantec Velociraptor | =model_1100 | |
Symantec Velociraptor | =model_1200 | |
Symantec Velociraptor | =model_1300 | |
Symantec Gateway Security | =5110 | |
Symantec Gateway Security | =5200 | |
Symantec Gateway Security | =5300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1463 is considered to have high severity due to the potential for connection spoofing.
To fix CVE-2002-1463, update or patch the affected Symantec firewall products to the latest versions provided by the vendor.
CVE-2002-1463 affects Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor models 500/700/1000/1100/1200/1300, and Gateway Security 5110/5200/5300.
CVE-2002-1463 enables remote attackers to spoof connections by generating easily predictable initial sequence numbers.
CVE-2002-1463 is not classified as critical but still poses a significant risk to network security if not addressed.