var-200212-0449
Vulnerability from variot
Symantec Norton Personal Firewall 2002 allows remote attackers to bypass the portscan protection by using a (1) SYN/FIN, (2) SYN/FIN/URG, (3) SYN/FIN/PUSH, or (4) SYN/FIN/URG/PUSH scan. Symantec Norton Personal Firewall 2002 (NPW)is a firewall solution for home and small office machines based on some versions of the Microsoft Windows operating systems. It has a variety of features, including the ability to detect and dynamically block portscans. An issue has been reported with the manner in which Personal Firewall 2002 handles portscans. Reportedly, only SYN scans are detected. An attacker may scan with a variety of other methods, including SYN/FIN packets and evade the protective features of NPW. This issue may affect Norton Internet Security 2002, however this has not been confirmed
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200212-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton personal firewall", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "2002" } ], "sources": [ { "db": "BID", "id": "4521" }, { "db": "CNNVD", "id": "CNNVD-200212-104" }, { "db": "NVD", "id": "CVE-2002-1778" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alfonso Fiore\u203b afiore@secure-edge.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-104" } ], "trust": 0.6 }, "cve": "CVE-2002-1778", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2002-1778", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-6161", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2002-1778", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200212-104", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-6161", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2002-1778", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-6161" }, { "db": "VULMON", "id": "CVE-2002-1778" }, { "db": "CNNVD", "id": "CNNVD-200212-104" }, { "db": "NVD", "id": "CVE-2002-1778" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Norton Personal Firewall 2002 allows remote attackers to bypass the portscan protection by using a (1) SYN/FIN, (2) SYN/FIN/URG, (3) SYN/FIN/PUSH, or (4) SYN/FIN/URG/PUSH scan. Symantec Norton Personal Firewall 2002 (NPW)is a firewall solution for home and small office machines based on some versions of the Microsoft Windows operating systems. It has a variety of features, including the ability to detect and dynamically block portscans. \nAn issue has been reported with the manner in which Personal Firewall 2002 handles portscans. Reportedly, only SYN scans are detected. An attacker may scan with a variety of other methods, including SYN/FIN packets and evade the protective features of NPW. \nThis issue may affect Norton Internet Security 2002, however this has not been confirmed", "sources": [ { "db": "NVD", "id": "CVE-2002-1778" }, { "db": "BID", "id": "4521" }, { "db": "VULHUB", "id": "VHN-6161" }, { "db": "VULMON", "id": "CVE-2002-1778" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "4521", "trust": 2.1 }, { "db": "NVD", "id": "CVE-2002-1778", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-200212-104", "trust": 0.7 }, { "db": "XF", "id": "8859", "trust": 0.6 }, { "db": "NSFOCUS", "id": "2626", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-6161", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2002-1778", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-6161" }, { "db": "VULMON", "id": "CVE-2002-1778" }, { "db": "BID", "id": "4521" }, { "db": "CNNVD", "id": "CNNVD-200212-104" }, { "db": "NVD", "id": "CVE-2002-1778" } ] }, "id": "VAR-200212-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-6161" } ], "trust": 0.01 }, "last_update_date": "2024-11-22T23:00:39.701000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2002-1778" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://securityresponse.symantec.com/avcenter/security/content/2002.05.16.html" }, { "trust": 2.8, "url": "http://www.securityfocus.com/bid/4521" }, { "trust": 2.2, "url": "http://online.securityfocus.com/archive/1/267850" }, { "trust": 2.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8859" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/8859" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/2626" }, { "trust": 0.3, "url": "http://www.symantec.com/sabu/nis/npf/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=3622" } ], "sources": [ { "db": "VULHUB", "id": "VHN-6161" }, { "db": "VULMON", "id": "CVE-2002-1778" }, { "db": "BID", "id": "4521" }, { "db": "CNNVD", "id": "CNNVD-200212-104" }, { "db": "NVD", "id": "CVE-2002-1778" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-6161" }, { "db": "VULMON", "id": "CVE-2002-1778" }, { "db": "BID", "id": "4521" }, { "db": "CNNVD", "id": "CNNVD-200212-104" }, { "db": "NVD", "id": "CVE-2002-1778" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-12-31T00:00:00", "db": "VULHUB", "id": "VHN-6161" }, { "date": "2002-12-31T00:00:00", "db": "VULMON", "id": "CVE-2002-1778" }, { "date": "2002-04-16T00:00:00", "db": "BID", "id": "4521" }, { "date": "2002-04-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200212-104" }, { "date": "2002-12-31T05:00:00", "db": "NVD", "id": "CVE-2002-1778" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-6161" }, { "date": "2017-07-11T00:00:00", "db": "VULMON", "id": "CVE-2002-1778" }, { "date": "2002-04-16T00:00:00", "db": "BID", "id": "4521" }, { "date": "2019-12-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200212-104" }, { "date": "2024-11-20T23:42:06.253000", "db": "NVD", "id": "CVE-2002-1778" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-104" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Norton Personal Firewall 2002 Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-104" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-104" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.