CVE-2002-1979

WatchGuard SOHO products running firmware 5.1.6 and earlier, and Vclass/RSSA using 3.2 SP1 and earlier, allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:watchguard:legacy_rssa:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:soho:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:vclass:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:42

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/328867 - US Government Resource () http://www.kb.cert.org/vuls/id/328867 - US Government Resource
References () http://www.kb.cert.org/vuls/id/AAMN-5EQR65 - Patch () http://www.kb.cert.org/vuls/id/AAMN-5EQR65 - Patch

Information

Published : 2002-12-31 05:00

Updated : 2024-11-20 23:42


NVD link : CVE-2002-1979

Mitre link : CVE-2002-1979

CVE.ORG link : CVE-2002-1979


JSON object : View

Products Affected

watchguard

  • legacy_rssa
  • soho
  • vclass
CWE
CWE-20

Improper Input Validation