7.5
CVSSv2

CVE-2002-1463

Published: 09/06/2003 Updated: 10/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote malicious users to spoof connections.

Vulnerable Product Search on Vulmon Subscribe to Product

symantec raptor firewall 6.5

symantec raptor firewall 6.5.3

symantec enterprise firewall 6.5.2

symantec enterprise firewall 7.0

symantec velociraptor model_500

symantec velociraptor model_700

symantec velociraptor model_1200

symantec velociraptor model_1300

symantec velociraptor model_1000

symantec velociraptor model_1100

symantec gateway security 5110

symantec gateway security 5200

symantec gateway security 5300

Exploits

source: wwwsecurityfocuscom/bid/670/info A vulnerability in the Linux kernel allows remote users to guess the initial sequence number of TCP sessions This can be used to create spoofed TCP sessions bypassing some types of IP based access controls The function 'secure_tcp_sequence_number' in the file 'drivers/char/randomc' at line 1684 ...