Watchguard SOHO Firewall Oversized GET Request DoS Vulnerability

BID:2114

Info

Watchguard SOHO Firewall Oversized GET Request DoS Vulnerability

Bugtraq ID: 2114
Class: Failure to Handle Exceptional Conditions
CVE: CVE-2000-0895
Remote: Yes
Local: Yes
Published: Dec 14 2000 12:00AM
Updated: Jul 11 2009 04:46AM
Credit: Discovered by Steven Maks and Keith Jarvis of Internet Security Systems <[email protected]> and posted to Bugtraq on December 14, 2000.
Vulnerable: WatchGuard SOHO Firewall 2.1.3
WatchGuard SOHO Firewall 1.6
Not Vulnerable: WatchGuard SOHO Firewall 2.2.1

Discussion

Watchguard SOHO Firewall Oversized GET Request DoS Vulnerability

SOHO Firewall is an appliance firewall by Watchguard Technologies Inc. designed for Small Office/Home Office users.

SOHO Firewall is susceptible to a trivial denial of service attack. Performing an overly long GET request to the web server component will cause SOHO Firewall to crash. Restarting the service is required in order to regain normal functionality. Watchguard has confirmed that this vulnerability could not be implemented to launch arbitrary code.

Successful exploitation of this vulnerability could assist in the development of further attacks due to the elimination of a firewall defense.

Solution / Fix

Watchguard SOHO Firewall Oversized GET Request DoS Vulnerability

Solution:
Watchguard has addressed this vulnerability with the latest release of SOHO Firewall. The latest version can be downloaded at the following location:

http://bisd.watchguard.com/SOHO/Downloads/swupdates.asp

References

Watchguard SOHO Firewall Oversized GET Request DoS Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report