Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Gateway_security
(Symantec)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 8 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2006-09-06 | CVE-2006-4562 | The proxy DNS service in Symantec Gateway Security (SGS) allows remote attackers to make arbitrary DNS queries to third-party DNS servers, while hiding the source IP address of the attacker. NOTE: another researcher has stated that the default configuration does not proxy DNS queries received on the external interface | Gateway_security | N/A | ||
2005-02-08 | CVE-2005-0249 | Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header. | Antivirus_scan_engine, Brightmail_antispam, Client_security, Gateway_security, Mail_security, Norton_antivirus, Norton_internet_security, Norton_system_works, Sav_filter_domino_nt_ports, Sav_filter_for_domino_nt, Web_security | N/A | ||
2006-05-11 | CVE-2006-2341 | The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI. | Enterprise_firewall, Gateway_security | N/A | ||
2004-06-15 | CVE-2004-1754 | The DNS proxy (DNSd) for multiple Symantec Gateway Security products allows remote attackers to poison the DNS cache via a malicious DNS server query response that contains authoritative or additional records. | Enterprise_firewall, Gateway_security | N/A | ||
2004-12-31 | CVE-2004-1472 | Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 allow remote attackers to cause a denial of service (device freeze) via a fast UDP port scan on the WAN interface. | Firewall_vpn_appliance_100, Firewall_vpn_appliance_200, Firewall_vpn_appliance_200r, Gateway_security, Nexland_isb_soho_firewall_appliance, Nexland_pro100_firewall_appliance, Nexland_pro400_firewall_appliance, Nexland_pro800_firewall_appliance, Nexland_pro800turbo_firewall_appliance, Nexland_wavebase_firewall_appliance | N/A | ||
2003-06-09 | CVE-2002-1463 | Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections. | Enterprise_firewall, Gateway_security, Raptor_firewall, Velociraptor | N/A | ||
2002-10-28 | CVE-2002-0990 | The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout. | Enterprise_firewall, Gateway_security, Raptor_firewall, Velociraptor | N/A | ||
2002-07-03 | CVE-2002-0538 | FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability. | Enterprise_firewall, Gateway_security, Raptor_firewall, Velociraptor | N/A |