CVE-2004-1473
Summary
| CVE | CVE-2004-1473 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-12-31 05:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53. |
Risk And Classification
Primary CVSS: v2.0 5 from [email protected]
AV:N/AC:L/Au:N/C:P/I:N/A:N
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Symantec | Firewall Vpn Appliance 100 | All | All | All | All |
| Hardware | Symantec | Firewall Vpn Appliance 200 | All | All | All | All |
| Hardware | Symantec | Firewall Vpn Appliance 200r | All | All | All | All |
| Hardware | Symantec | Gateway Security 320 | All | All | All | All |
| Hardware | Symantec | Gateway Security 360 | All | All | All | All |
| Hardware | Symantec | Gateway Security 360r | All | All | All | All |
| Hardware | Symantec | Nexland Isb Soho Firewall Appliance | All | All | All | All |
| Hardware | Symantec | Nexland Pro100 Firewall Appliance | All | All | All | All |
| Hardware | Symantec | Nexland Pro400 Firewall Appliance | All | All | All | All |
| Hardware | Symantec | Nexland Pro800turbo Firewall Appliance | All | All | All | All |
| Hardware | Symantec | Nexland Pro800 Firewall Appliance | All | All | All | All |
| Hardware | Symantec | Nexland Wavebase Firewall Appliance | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Symantec Enterprise Firewall/VPN Appliance Multiple Remote Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Symantec Clientless VPN Gateway 4400 Series v5.0 Hotfix | af854a3a-2127-422b-91ae-364da2661108 | securityresponse.symantec.com | Patch, Vendor Advisory |
| www.osvdb.org/10205 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| US-CERT Vulnerability Note VU#329230 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | Patch, Third Party Advisory, US Government Resource |
| 'Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Secunia - Advisories - Symantec Firewall/VPN Products Multiple Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.