CVE-2002-1979
Published Dec 31, 2002
Last updated 16 years ago
Overview
- Description
- WatchGuard SOHO products running firmware 5.1.6 and earlier, and Vclass/RSSA using 3.2 SP1 and earlier, allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:watchguard:legacy_rssa:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39A02CDD-085D-4351-B28C-5141005116DE", "versionEndIncluding": "3.2_sp1" }, { "criteria": "cpe:2.3:h:watchguard:soho:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A96FC683-AA27-426C-8D5F-46673722A06F", "versionEndIncluding": "5.1.6" }, { "criteria": "cpe:2.3:h:watchguard:vclass:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15144365-AD24-4654-A513-AF0D864ED38F", "versionEndIncluding": "3.2_sp1" } ], "operator": "OR" } ] } ]