First published: Fri Dec 31 2004(Updated: )
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Gateway Security 360 | ||
Symantec Firewall Vpn Appliance 200 | ||
Symantec Nexland Wavebase Firewall Appliance | ||
Symantec Gateway Security 320 | ||
Symantec Nexland Pro400 Firewall Appliance | ||
Symantec Gateway Security 360r | ||
Symantec Nexland Pro800turbo Firewall Appliance | ||
Symantec Nexland Pro800 Firewall Appliance | ||
Symantec Nexland Pro100 Firewall Appliance | ||
Symantec Firewall Vpn Appliance 200r | ||
Symantec Nexland Isb Soho Firewall Appliance | ||
Symantec Firewall Vpn Appliance 100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.