7.5
CVSSv2

CVE-2002-1463

Published: 09/06/2003 Updated: 10/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote malicious users to spoof connections.

Vulnerable Product Search on Vulmon Subscribe to Product

symantec enterprise firewall 7.0

symantec velociraptor model 500

symantec velociraptor model 1100

symantec raptor firewall 6.5.3

symantec velociraptor model 1200

symantec raptor firewall 6.5

symantec velociraptor model 1000

symantec enterprise firewall 6.5.2

symantec velociraptor model 700

symantec velociraptor model 1300

symantec gateway security 5110

symantec gateway security 5300

symantec gateway security 5200

Exploits

source: wwwsecurityfocuscom/bid/670/info A vulnerability in the Linux kernel allows remote users to guess the initial sequence number of TCP sessions This can be used to create spoofed TCP sessions bypassing some types of IP based access controls The function 'secure_tcp_sequence_number' in the file 'drivers/char/randomc' at line 1684 ...