Gauntlet CyberPatrol Content Monitoring System Overflow

critical Nessus Plugin ID 10420

Synopsis

The remote host is affected by a buffer overflow.

Description

The remote host is running Network Associated Gauntlet firewall. The installed version of the software is vulnerable to a buffer overflow.
An attacker could exploit this flaw in order to remotely execute arbitrary commands on the affected host.

Solution

Apply the workaround or patches from the listed references.

See Also

http://www.nessus.org/u?f69d6a17

https://seclists.org/bugtraq/2000/May/254

Plugin Details

Severity: Critical

ID: 10420

File Name: gauntlet_overflow.nasl

Version: 1.27

Type: remote

Published: 5/25/2000

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 5/22/2000

Reference Information

CVE: CVE-2000-0437

BID: 1234