Skip navigation

Multiple Vulnerabilities Discovered in WatchGuard SOHO Firewall

Reported December 13, 2000 by WatchGuard

VERSIONS AFFECTED
  • WatchGuard SOHO Firewall 2.2 and earlier

DESCRIPTION

Multiple vulnerabilities have been discovered in WatchGuard SOHO Firewall 2.2 and earlier:

1.  A malicious attacker can access sensitive configuration remotely.

2.      An attacker can use a remotely exploitable buffer overflow and apply excessively long HTTG GET requests to launch arbitrary code.

3.      An attacker can cause a Denial of Service (DoS) attack by sending fragmented packets.

4.      A malicious attacker can use the POST command to reset the SOHO Firewall Password without authentication.

VENDOR RESPONSE

WatchGuard has issued a revised version 2.2.1 that is not vulnerable to these attacks.  Customers should contact WatchGuard for an upgrade.  http://www.watchguard.com

CREDIT
Discovered by
ISS X-Force

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish