CVE-2000-0150

Current Description

Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt.

Basic Data

PublishedFebruary 12, 2000
Last ModifiedOctober 30, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegetrue
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationCheckpointFirewall-13.0*******
    2.3ApplicationCheckpointFirewall-14.0*******
    2.3OSCiscoPix Firewall Software4.1(6)*******
    2.3OSCiscoPix Firewall Software4.1(6b)*******
    2.3OSCiscoPix Firewall Software4.2(1)*******
    2.3OSCiscoPix Firewall Software4.2(2)*******
    2.3OSCiscoPix Firewall Software4.3*******
    2.3OSCiscoPix Firewall Software4.4(4)*******
    2.3OSCiscoPix Firewall Software5.0*******

Vulnerable Software List

VendorProductVersions
Checkpoint Firewall-1 3.0, 4.0
Cisco Pix Firewall Software 4.1(6), 4.1(6b), 4.2(1), 4.2(2), 4.3, 4.4(4), 5.0

References

NameSourceURLTags
VU#328867http://www.kb.cert.org/vuls/id/328867CERT-VNUS Government Resource
4417http://www.osvdb.org/4417OSVDB
979http://www.securityfocus.com/bid/979BID