{"api_version":"1","generated_at":"2026-04-23T02:58:30+00:00","cve":"CVE-2004-0369","urls":{"html":"https://cve.report/CVE-2004-0369","api":"https://cve.report/api/cve/CVE-2004-0369.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2004-0369","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2004-0369"},"summary":{"title":"CVE-2004-0369","description":"Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload.","state":"PUBLISHED","assigner":"mitre","published_at":"2004-12-31 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html","name":"http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Symantec IPsec/ISAKMP VPN Buffer Overflow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/11039","name":"http://www.securityfocus.com/bid/11039","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Entrust LibKMP ISAKMP Library Remote IPsec/ISAKMP Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.auscert.org.au/render.html?it=4339","name":"http://www.auscert.org.au/render.html?it=4339","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"AusCERT - ESB-2004.0538 -- SYM04-012 -- Symantec IPsec/ISAKMP VPN Buffer Overflow","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15669","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15669","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ciac.org/ciac/bulletins/o-206.shtml","name":"http://www.ciac.org/ciac/bulletins/o-206.shtml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"O-206: Entrust LibKmp Library Vulnerabilities","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://xforce.iss.net/xforce/alerts/id/181","name":"http://xforce.iss.net/xforce/alerts/id/181","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2004-0369","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0369","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2004","cve_id":"369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"entrust","cpe5":"entrust_libkmp_isakmp_library","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enterprise_firewall","cpe6":"7.0","cpe7":"*","cpe8":"solaris","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enterprise_firewall","cpe6":"7.0.4","cpe7":"*","cpe8":"solaris","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enterprise_firewall","cpe6":"7.0.4","cpe7":"*","cpe8":"windows_2000_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enterprise_firewall","cpe6":"8.0","cpe7":"*","cpe8":"solaris","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enterprise_firewall","cpe6":"8.0","cpe7":"*","cpe8":"windows_2000_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"gateway_security_5300","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"symantec","cpe5":"gateway_security_5400","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"velociraptor","cpe6":"1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T00:17:14.359Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"ESB-2004.0538","tags":["third-party-advisory","x_refsource_AUSCERT","x_transferred"],"url":"http://www.auscert.org.au/render.html?it=4339"},{"name":"isakmp-spi-size-bo(15669)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15669"},{"name":"20040826 Entrust LibKmp Library Buffer Overflow","tags":["third-party-advisory","x_refsource_ISS","x_transferred"],"url":"http://xforce.iss.net/xforce/alerts/id/181"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html"},{"name":"O-206","tags":["third-party-advisory","government-resource","x_refsource_CIAC","x_transferred"],"url":"http://www.ciac.org/ciac/bulletins/o-206.shtml"},{"name":"11039","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/11039"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2004-08-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-10T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"ESB-2004.0538","tags":["third-party-advisory","x_refsource_AUSCERT"],"url":"http://www.auscert.org.au/render.html?it=4339"},{"name":"isakmp-spi-size-bo(15669)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15669"},{"name":"20040826 Entrust LibKmp Library Buffer Overflow","tags":["third-party-advisory","x_refsource_ISS"],"url":"http://xforce.iss.net/xforce/alerts/id/181"},{"tags":["x_refsource_CONFIRM"],"url":"http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html"},{"name":"O-206","tags":["third-party-advisory","government-resource","x_refsource_CIAC"],"url":"http://www.ciac.org/ciac/bulletins/o-206.shtml"},{"name":"11039","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/11039"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2004-0369","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"ESB-2004.0538","refsource":"AUSCERT","url":"http://www.auscert.org.au/render.html?it=4339"},{"name":"isakmp-spi-size-bo(15669)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15669"},{"name":"20040826 Entrust LibKmp Library Buffer Overflow","refsource":"ISS","url":"http://xforce.iss.net/xforce/alerts/id/181"},{"name":"http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html","refsource":"CONFIRM","url":"http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html"},{"name":"O-206","refsource":"CIAC","url":"http://www.ciac.org/ciac/bulletins/o-206.shtml"},{"name":"11039","refsource":"BID","url":"http://www.securityfocus.com/bid/11039"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2004-0369","datePublished":"2005-04-14T04:00:00.000Z","dateReserved":"2004-03-24T00:00:00.000Z","dateUpdated":"2024-08-08T00:17:14.359Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2004-12-31 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:entrust:entrust_libkmp_isakmp_library:*:*:*:*:*:*:*:*","matchCriteriaId":"302E62EC-C81E-4BD5-A8E0-0CC55F34BE17"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enterprise_firewall:7.0:*:solaris:*:*:*:*:*","matchCriteriaId":"8656778B-9299-436B-AF8A-64C042273751"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enterprise_firewall:7.0.4:*:solaris:*:*:*:*:*","matchCriteriaId":"78A16B88-E49B-4C4C-A82E-03511C99872D"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enterprise_firewall:7.0.4:*:windows_2000_nt:*:*:*:*:*","matchCriteriaId":"30BE919C-A7DF-46C3-BFF6-F0452F0FC434"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enterprise_firewall:8.0:*:solaris:*:*:*:*:*","matchCriteriaId":"F66D6BB6-2355-4644-8A18-725F9E970EA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enterprise_firewall:8.0:*:windows_2000_nt:*:*:*:*:*","matchCriteriaId":"AD892E2E-E1C9-49A2-A42C-3B56F2B0BA4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:velociraptor:1.5:*:*:*:*:*:*:*","matchCriteriaId":"C260200D-60D2-41E2-8F5C-50796EBBF8E2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:gateway_security_5300:1.0:*:*:*:*:*:*:*","matchCriteriaId":"3EDDB133-A6C8-45B4-9988-3D3D2F3952E8"},{"vulnerable":true,"criteria":"cpe:2.3:h:symantec:gateway_security_5400:2.0:*:*:*:*:*:*:*","matchCriteriaId":"C1B7CF42-F93E-48E6-BCD2-30B357F80DDA"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2004","CveId":"369","Ordinal":"1","Title":"CVE-2004-0369","CVE":"CVE-2004-0369","Year":"2004"},"notes":[{"CveYear":"2004","CveId":"369","Ordinal":"1","NoteData":"Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload.","Type":"Description","Title":"CVE-2004-0369"},{"CveYear":"2004","CveId":"369","Ordinal":"2","NoteData":"2005-04-14","Type":"Other","Title":"Published"},{"CveYear":"2004","CveId":"369","Ordinal":"3","NoteData":"2017-07-10","Type":"Other","Title":"Modified"}]}}}