Overview
A vulnerability in the Symantec Firewall/VPN appliance could allow an attacker to cause a denial-of-service condition.
Description
| The Symantec Firewall/VPN appliance supports a number of services that utilize the UDP protocol including tftpd, snmpd, and isakmp. There is a vulnerability in the Firewall/VPN appliance that allows a UDP port scan on the WAN interface against all ports (i.e. 1-65535) to cause the device to stop responding. In order to regain functionality, the device must be powered off and back on. Affected Products: 
 | 
Impact
| A remote, unauthenticated attacker could cause a denial-of-service condition. | 
Solution
| Upgrade FirmwareAccording to the Symantec Advisory, product specific firmware and hotfixes are available via the Symantec Enterprise Support site. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was reported by Symantec. Symantec credits Mike Sues and the Rigel Kent Security & Advisory Services for discovering the vulnerability.
This document was written by Damon Morda.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 5.78 | 
| Date Public: | 2004-09-22 | 
| Date First Published: | 2004-10-20 | 
| Date Last Updated: | 2004-10-20 14:37 UTC | 
| Document Revision: | 8 |