Lucene search

K
f5F5F5:K06145135
HistoryApr 05, 2016 - 12:00 a.m.

K06145135 : Remote DNS security filter vulnerabilities CVE-2003-1491 and CVE-2004-1473

2016-04-0500:00:00
my.f5.com
102

6.7 Medium

AI Score

Confidence

Low

0.009 Low

EPSS

Percentile

83.0%

Security Advisory Description

Kerio Personal Firewall (KPF) 2.1.4 has a default rule to accept incoming packets from DNS (UDP port 53), which allows remote attackers to bypass the firewall filters via packets with a source port of 53.

Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.
Impact
There is no impact; F5 products are not affected by this vulnerability.

6.7 Medium

AI Score

Confidence

Low

0.009 Low

EPSS

Percentile

83.0%

Related for F5:K06145135