Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-1517 | First vendor Publication | 2005-05-11 |
Vendor | Cve | Last vendor Modification | 2011-03-08 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unknown vulnerability in Cisco Firewall Services Module (FWSM) 2.3.1 and earlier, when using URL, FTP, or HTTPS filtering exceptions, allows certain TCP packets to bypass access control lists (ACLs). |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1517 |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
16423 | Cisco Firewall Services Module (FWSM) TCP Packet access-list Bypass Cisco Firewall Services Module (FWSM) contains a flaw that may allow a malicious user to bypass ACE entries that will normally block these type of connections. The issue is triggered due to an error in the URL, FTP and HTTPS filtering function. It is possible that the flaw may allow ACE bypass resulting in a loss of integrity. |
Sources (Detail)
Source | Url |
---|---|
CISCO | http://www.cisco.com/warp/public/707/cisco-sa-20050511-url.shtml |
VUPEN | http://www.vupen.com/english/advisories/2005/0527 |
Alert History
Date | Informations |
---|---|
2021-05-08 01:01:56 |
|
2021-05-04 12:02:57 |
|
2021-04-22 01:03:12 |
|
2020-05-23 01:36:40 |
|
2020-05-23 00:16:33 |
|
2016-04-26 13:30:41 |
|
2013-05-11 11:25:58 |
|