First published: Wed Apr 02 2003(Updated: )
Format string vulnerability in the CLI interface for WatchGuard Firebox Vclass 3.2 and earlier, and RSSA Appliance 3.0.2, allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in the password parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Watchguard Firebox | =v10 | |
Watchguard Firebox | =v60 | |
Rapidstream Rapidstream | =2000 | |
Rapidstream Rapidstream | =500 | |
Rapidstream Rapidstream | =4000 | |
Rapidstream Rapidstream | =8000 | |
Watchguard Firebox | =v80 | |
Watchguard Firebox | =v100 | |
Rapidstream Rapidstream | =6000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2002-1519 is high due to the potential for denial of service and arbitrary code execution.
To fix CVE-2002-1519, update to the latest version of the firmware for affected WatchGuard Firebox and Rapidstream devices.
CVE-2002-1519 affects WatchGuard Firebox versions v10, v60, v80, and v100, as well as Rapidstream devices 2000, 500, 4000, 6000, and 8000.
CVE-2002-1519 is a format string vulnerability in the CLI interface of specific networking devices.
Yes, CVE-2002-1519 can be exploited remotely by attackers using crafted format string specifiers in the password parameter.