var-200509-0077
Vulnerability from variot
Check Point NGX R60 does not properly verify packets against the predefined service group "CIFS" rule, which allows remote attackers to bypass intended restrictions. CIFS There is a vulnerability that will be interpreted.Check Point VPN-1/FireWall-1 May be restricted and may be connected to a computer in the network. This issue is due to a failure of the software to properly implement expected firewall rules. This vulnerability allows attackers to bypass firewall rules, letting them attack protected services and computers without expected restriction. This also issue leads to a false sense of security by firewall administrators.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Check Point Firewall CIFS Service Group Rule Bypass
SECUNIA ADVISORY ID: SA16770
VERIFY ADVISORY: http://secunia.com/advisories/16770/
CRITICAL: Less critical
IMPACT: Security Bypass
WHERE:
From remote
SOFTWARE: Check Point VPN-1/Firewall-1 NG http://secunia.com/product/89/ Check Point VPN-1 Server 4.x http://secunia.com/product/2965/ Check Point Provider-1 http://secunia.com/product/3262/ Check Point FireWall-1 GX 2.x http://secunia.com/product/3263/ Check Point Firewall-1 4.x http://secunia.com/product/88/ Check Point VPN-1/FireWall-1 NG with Application Intelligence (AI) http://secunia.com/product/2542/ Check Point VPN-1/FireWall-1 VSX NG http://secunia.com/product/3264/
DESCRIPTION: fitz has reported a security issue in Check Point Firewall, which potentially can be exploited by malicious people to bypass certain security restrictions.
The security issue has been reported in the following products: * VPN-1/FireWall-1 * VPN-1 VSX * Provider-1
SOLUTION: The vendor suggests renaming the CIFS service group.
Refer to the vendor's advisory for instructions.
PROVIDED AND/OR DISCOVERED BY: fitz
ORIGINAL ADVISORY: Check Point: http://secureknowledge.us.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?id=sk31196
OTHER REFERENCES: US-CERT VU#508209: http://www.kb.cert.org/vuls/id/508209
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200509-0077", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "connectra ngx", "scope": "eq", "trust": 1.6, "vendor": "checkpoint", "version": "r60" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "check point", "version": null }, { "model": "vpn-1/firewall-1", "scope": "lte", "trust": 0.8, "vendor": "check point", "version": "ng fp3" }, { "model": "vpn-1/firewall-1", "scope": "lte", "trust": 0.8, "vendor": "check point", "version": "ng with application intelligence (r55w)" }, { "model": "point software vpn-1 next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software vpn-1 next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software vpn-1 next generation fp0", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software vpn-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp5a", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software vpn-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software secureplatform ngx r60 build", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "244" }, { "model": "point software secureplatform ng fp2 edition", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "2" }, { "model": "point software secureplatform ng fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software secureplatform ng fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software secureplatform ng", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software provider-1 ng with application intelligence r55", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software provider-1 ng with application intelligence r54", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software provider-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software provider-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software provider-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software provider-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software provider-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 next generation fp3", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 next generation fp2", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 next generation fp1", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 next generation fp0", "scope": null, "trust": 0.3, "vendor": "check", "version": null }, { "model": "point software firewall-1 [ vpn des ]", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "+4.1" }, { "model": "point software firewall-1 [ vpn des strong ] sp2 build", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "++4.141716" }, { "model": "point software firewall-1 [ vpn des strong ] build", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "++4.141439" }, { "model": "point software firewall-1 sp6", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5a", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp5", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp4", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp3", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp2", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1 sp1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software firewall-1", "scope": "eq", "trust": 0.3, "vendor": "check", "version": "4.1" }, { "model": "point software connectra ngx r60", "scope": null, "trust": 0.3, "vendor": "check", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#508209" }, { "db": "BID", "id": "14781" }, { "db": "BID", "id": "89347" }, { "db": "JVNDB", "id": "JVNDB-2005-000517" }, { "db": "CNNVD", "id": "CNNVD-200509-111" }, { "db": "NVD", "id": "CVE-2005-2889" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:checkpoint:vpn-1_firewall-1", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000517" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "fitz \u003cfitzimailing@yahoo.de\u003e discovered this vulnerability.", "sources": [ { "db": "BID", "id": "14781" } ], "trust": 0.3 }, "cve": "CVE-2005-2889", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2005-2889", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-14098", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2005-2889", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#508209", "trust": 0.8, "value": "4.39" }, { "author": "NVD", "id": "CVE-2005-2889", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200509-111", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-14098", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#508209" }, { "db": "VULHUB", "id": "VHN-14098" }, { "db": "JVNDB", "id": "JVNDB-2005-000517" }, { "db": "CNNVD", "id": "CNNVD-200509-111" }, { "db": "NVD", "id": "CVE-2005-2889" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Check Point NGX R60 does not properly verify packets against the predefined service group \"CIFS\" rule, which allows remote attackers to bypass intended restrictions. CIFS There is a vulnerability that will be interpreted.Check Point VPN-1/FireWall-1 May be restricted and may be connected to a computer in the network. This issue is due to a failure of the software to properly implement expected firewall rules. \nThis vulnerability allows attackers to bypass firewall rules, letting them attack protected services and computers without expected restriction. \nThis also issue leads to a false sense of security by firewall administrators. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCheck Point Firewall CIFS Service Group Rule Bypass\n\nSECUNIA ADVISORY ID:\nSA16770\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/16770/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nCheck Point VPN-1/Firewall-1 NG\nhttp://secunia.com/product/89/\nCheck Point VPN-1 Server 4.x\nhttp://secunia.com/product/2965/\nCheck Point Provider-1\nhttp://secunia.com/product/3262/\nCheck Point FireWall-1 GX 2.x\nhttp://secunia.com/product/3263/\nCheck Point Firewall-1 4.x\nhttp://secunia.com/product/88/\nCheck Point VPN-1/FireWall-1 NG with Application Intelligence (AI)\nhttp://secunia.com/product/2542/\nCheck Point VPN-1/FireWall-1 VSX NG\nhttp://secunia.com/product/3264/\n\nDESCRIPTION:\nfitz has reported a security issue in Check Point Firewall, which\npotentially can be exploited by malicious people to bypass certain\nsecurity restrictions. \n\nThe security issue has been reported in the following products:\n* VPN-1/FireWall-1\n* VPN-1 VSX\n* Provider-1\n\nSOLUTION:\nThe vendor suggests renaming the CIFS service group. \n\nRefer to the vendor\u0027s advisory for instructions. \n\nPROVIDED AND/OR DISCOVERED BY:\nfitz\n\nORIGINAL ADVISORY:\nCheck Point:\nhttp://secureknowledge.us.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?id=sk31196\n\nOTHER REFERENCES:\nUS-CERT VU#508209:\nhttp://www.kb.cert.org/vuls/id/508209\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-2889" }, { "db": "CERT/CC", "id": "VU#508209" }, { "db": "JVNDB", "id": "JVNDB-2005-000517" }, { "db": "BID", "id": "14781" }, { "db": "BID", "id": "89347" }, { "db": "VULHUB", "id": "VHN-14098" }, { "db": "PACKETSTORM", "id": "40276" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#508209", "trust": 3.7 }, { "db": "NVD", "id": "CVE-2005-2889", "trust": 2.8 }, { "db": "BID", "id": "14781", "trust": 1.9 }, { "db": "SECUNIA", "id": "16770", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2005-000517", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200509-111", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20050907 RULE BYPASSING IN CHECKPOINT NGX R60", "trust": 0.6 }, { "db": "BID", "id": "89347", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-14098", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "40276", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#508209" }, { "db": "VULHUB", "id": "VHN-14098" }, { "db": "BID", "id": "14781" }, { "db": "BID", "id": "89347" }, { "db": "JVNDB", "id": "JVNDB-2005-000517" }, { "db": "PACKETSTORM", "id": "40276" }, { "db": "CNNVD", "id": "CNNVD-200509-111" }, { "db": "NVD", "id": "CVE-2005-2889" } ] }, "id": "VAR-200509-0077", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-14098" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:50:35.093000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "sk31196", "trust": 0.8, "url": "http://secureknowledge.us.checkpoint.com/SecureKnowledge/viewSolutionDocument.do?id=sk31196" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000517" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2889" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.kb.cert.org/vuls/id/508209" }, { "trust": 2.3, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=112611529724821\u0026w=2" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/14781" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=112611529724821\u0026w=2" }, { "trust": 0.9, "url": "http://secureknowledge.us.checkpoint.com/secureknowledge/viewsolutiondocument.do?id=sk31196" }, { "trust": 0.8, "url": "http://www.securityfocus.com/archive/1/409877" }, { "trust": 0.8, "url": "http://secunia.com/advisories/16770" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2889" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2005/1773" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-2889" }, { "trust": 0.3, "url": "http://www.checkpoint.com/techsupport/" }, { "trust": 0.3, "url": "http://www.checkpoint.com/ngx/upgrade/index.html" }, { "trust": 0.3, "url": "/archive/1/409877" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=112611529724821\u0026amp;w=2" }, { "trust": 0.1, "url": "http://secunia.com/product/89/" }, { "trust": 0.1, "url": "http://secunia.com/product/3263/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/16770/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/2542/" }, { "trust": 0.1, "url": "http://secunia.com/product/88/" }, { "trust": 0.1, "url": "http://secunia.com/product/3264/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/3262/" }, { "trust": 0.1, "url": "http://secunia.com/product/2965/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#508209" }, { "db": "VULHUB", "id": "VHN-14098" }, { "db": "BID", "id": "14781" }, { "db": "BID", "id": "89347" }, { "db": "JVNDB", "id": "JVNDB-2005-000517" }, { "db": "PACKETSTORM", "id": "40276" }, { "db": "CNNVD", "id": "CNNVD-200509-111" }, { "db": "NVD", "id": "CVE-2005-2889" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#508209" }, { "db": "VULHUB", "id": "VHN-14098" }, { "db": "BID", "id": "14781" }, { "db": "BID", "id": "89347" }, { "db": "JVNDB", "id": "JVNDB-2005-000517" }, { "db": "PACKETSTORM", "id": "40276" }, { "db": "CNNVD", "id": "CNNVD-200509-111" }, { "db": "NVD", "id": "CVE-2005-2889" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-09-16T00:00:00", "db": "CERT/CC", "id": "VU#508209" }, { "date": "2005-09-14T00:00:00", "db": "VULHUB", "id": "VHN-14098" }, { "date": "2005-09-08T00:00:00", "db": "BID", "id": "14781" }, { "date": "2005-09-14T00:00:00", "db": "BID", "id": "89347" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000517" }, { "date": "2005-09-27T00:49:09", "db": "PACKETSTORM", "id": "40276" }, { "date": "2005-09-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200509-111" }, { "date": "2005-09-14T20:03:00", "db": "NVD", "id": "CVE-2005-2889" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-09-27T00:00:00", "db": "CERT/CC", "id": "VU#508209" }, { "date": "2016-10-18T00:00:00", "db": "VULHUB", "id": "VHN-14098" }, { "date": "2005-09-08T00:00:00", "db": "BID", "id": "14781" }, { "date": "2005-09-14T00:00:00", "db": "BID", "id": "89347" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000517" }, { "date": "2006-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-200509-111" }, { "date": "2024-11-21T00:00:40.207000", "db": "NVD", "id": "CVE-2005-2889" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "14781" }, { "db": "BID", "id": "89347" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Check Point Firewall rules may improperly handle network traffic", "sources": [ { "db": "CERT/CC", "id": "VU#508209" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "unknown", "sources": [ { "db": "CNNVD", "id": "CNNVD-200509-111" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.