Executive Summary
Summary | |
---|---|
Title | Shorewall vulnerability |
Informations | |||
---|---|---|---|
Name | USN-197-1 | First vendor Publication | 2005-10-10 |
Vendor | Ubuntu | Last vendor Modification | 2005-10-10 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: shorewall The problem can be corrected by upgrading the affected package to version 2.0.2-4ubuntu2.1 (for Ubuntu 4.10), or 2.0.13-1ubuntu0.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: A firewall bypass vulnerability has been found in shorewall. If MACLIST_TTL was set to a value greater than 0 or MACLIST_DISPOSITION was set to "ACCEPT" in /etc/shorewall/shorewall.conf, and a client was positively identified through its MAC address, that client bypassed all other policies/rules in place. This could allow external computers to get access to ports that are intended to be restricted by the firewall policy. Please note that this does not affect the default configuration, which does not enable MAC based client identification. |
Original Source
Url : http://www.ubuntu.com/usn/USN-197-1 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200507-20 (shorewall) File : nvt/glsa_200507_20.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 849-1 (shorewall) File : nvt/deb_849_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
18005 | Shorewall MACLIST_TTL Authenticated User Ruleset Bypass |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-01-15 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-197-1.nasl - Type : ACT_GATHER_INFO |
2005-10-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-849.nasl - Type : ACT_GATHER_INFO |
2005-07-22 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200507-20.nasl - Type : ACT_GATHER_INFO |
2005-07-21 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-123.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:02:32 |
|