ID CVE-2005-2317
Summary Shorewall 2.4.x before 2.4.1, 2.2.x before 2.2.5, and 2.0.x before 2.0.17, when MACLIST_TTL is greater than 0 or MACLIST_DISPOSITION is set to ACCEPT, allows remote attackers with an accepted MAC address to bypass other firewall rules or policies.
References
Vulnerable Configurations
  • cpe:2.3:a:shorewall:shorewall:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.0a:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.0a:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.0b:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.0b:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.2a:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.2a:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.2b:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.2b:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.2c:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.2c:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.2d:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.2d:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.2e:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.2e:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.2f:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.2f:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.3a:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.3a:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.3b:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.3b:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.3c:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.3c:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.4.0_rc1:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.4.0_rc1:*:*:*:*:*:*:*
  • cpe:2.3:a:shorewall:shorewall:2.4.0_rc2:*:*:*:*:*:*:*
    cpe:2.3:a:shorewall:shorewall:2.4.0_rc2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 05-09-2008 - 20:51)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 14292
confirm http://shorewall.net/News.htm#20050717
debian DSA-849
fulldisc 20050718 Shorewall MACLIST Problem
gentoo GLSA-200507-20
secunia
  • 16087
  • 17110
  • 17113
ubuntu USN-197-1
Last major update 05-09-2008 - 20:51
Published 19-07-2005 - 04:00
Last modified 05-09-2008 - 20:51
Back to Top