First published: Sun Mar 20 2005(Updated: )
Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote attackers to poison the DNS cache and redirect users to malicious sites.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Enterprise Firewall | =7.0 | |
Symantec Enterprise Firewall | =8.0 | |
Symantec Velociraptor | =model_1300 | |
Symantec Gateway Security 5400 | =2.0 | |
Symantec Gateway Security 5300 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0817 is considered to have a high severity due to the potential for remote code execution and DNS cache poisoning.
To fix CVE-2005-0817, apply the latest patches provided by Symantec for the affected products.
CVE-2005-0817 affects Symantec Enterprise Firewall versions 7.0 and 8.0, Symantec Gateway Security 5400, Symantec Gateway Security 5300, and VelociRaptor models 1100/1200/1300.
Failure to address CVE-2005-0817 could lead to DNS cache poisoning, allowing attackers to redirect users to malicious sites.
Currently, the recommended approach for CVE-2005-0817 is to apply vendor patches, but enabling strict DNS policies may provide some temporary protection.