Symantec Firewall Malformed TCP Packet Options Remote DoS

This script is (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a denial of service vulnerability.

Description :

The remote system appears vulnerable to an invalid Options field
within a TCP packet. At least one vendor firewall (Symantec) has been
reported prone to such a bug. An attacker, utilizing this flaw, would
be able to remotely shut down the remote firewall (stopping all
network-based transactions) by sending a single packet to any port.

See also :

http://research.eeye.com/html/advisories/published/AD20040423.html

Solution :

Apply vendor-supplied patches.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.6
(CVSS2#E:U/RL:U/RC:C)
Public Exploit Available : false

Family: Firewalls

Nessus Plugin ID: 12216 ()

Bugtraq ID: 10204

CVE ID: CVE-2004-0375