VAR-200206-0064

Vulnerability from variot - Updated: 2025-04-03 22:22

ISS RealSecure Network Sensor 5.x through 6.5 allows remote attackers to cause a denial of service (crash) via malformed DHCP packets that cause RealSecure to dereference a null pointer. ISS RealSecure Network Sensor "informational signatures" fail to properly process certain types of DHCP traffic, thereby causing the sensor to crash. RealSecure is the commercial Intrusion Detection System (IDS) distributed and maintained by ISS. RealSecure becomes unstable when processing some of the DHCP signatures packaged with the system. Due to the construction of the three DHCP signatures (DHCP_ACK - 7131, DHCP_Discover - 7132, and DHCP_Request - 7133), the RealSecure software may become unstable and crash. This is due to the software attempting to dereference a null pointer. If the sensor is disabled, further attacks may go unnoticed. Vulnerabilities exist in ISS RealSecure Network Sensor versions 5.x to 6.5

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200206-0064",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "information security",
        "version": "5.5_xpu_3.4"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "information security",
        "version": "6.0_xpu_3.4"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "information security",
        "version": "5.5.1_xpu_3.4"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "information security",
        "version": "6.5"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "information security",
        "version": "5.5.2_xpu_3.4"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "information security",
        "version": "5.0_xpu_3.4"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "internet security",
        "version": null
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "5.0"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "6.0"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.03.4"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.5.23.4"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.5.13.4"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.53.4"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.03.4"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#101915"
      },
      {
        "db": "BID",
        "id": "4649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200206-004"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0601"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:iss:realsecure_network_sensor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vulnerability announced by ISS X-Force.",
    "sources": [
      {
        "db": "BID",
        "id": "4649"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2002-0601",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2002-0601",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-4993",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2002-0601",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#101915",
            "trust": 0.8,
            "value": "4.73"
          },
          {
            "author": "NVD",
            "id": "CVE-2002-0601",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200206-004",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-4993",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#101915"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4993"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200206-004"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0601"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ISS RealSecure Network Sensor 5.x through 6.5 allows remote attackers to cause a denial of service (crash) via malformed DHCP packets that cause RealSecure to dereference a null pointer. ISS RealSecure Network Sensor \"informational signatures\" fail to properly process certain types of DHCP traffic, thereby causing the sensor to crash. RealSecure is the commercial Intrusion Detection System (IDS) distributed and maintained by ISS. \nRealSecure becomes unstable when processing some of the DHCP signatures packaged with the system.  Due to the construction of the three DHCP signatures (DHCP_ACK - 7131, DHCP_Discover - 7132, and DHCP_Request - 7133), the RealSecure software may become unstable and crash.  This is due to the software attempting to dereference a null pointer. \nIf the sensor is disabled, further attacks may go unnoticed. Vulnerabilities exist in ISS RealSecure Network Sensor versions 5.x to 6.5",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0601"
      },
      {
        "db": "CERT/CC",
        "id": "VU#101915"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      },
      {
        "db": "BID",
        "id": "4649"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4993"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "4649",
        "trust": 3.6
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0601",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "5165",
        "trust": 1.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#101915",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000103",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200206-004",
        "trust": 0.7
      },
      {
        "db": "ISS",
        "id": "20020430 REMOTE DENIAL OF SERVICE VULNERABILITY IN REALSECURE NETWORK SENSOR",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "8961",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20020430 ISS ADVISORY: REMOTE DENIAL OF SERVICE VULNERABILITY IN REALSECURE NETWORK SENSOR",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-4993",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#101915"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4993"
      },
      {
        "db": "BID",
        "id": "4649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200206-004"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0601"
      }
    ]
  },
  "id": "VAR-200206-0064",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-4993"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:22:04.565000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "advise116",
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/alerts/id/advise116"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-0601"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://www.securityfocus.com/bid/4649"
      },
      {
        "trust": 1.7,
        "url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0420.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.iss.net/security_center/alerts/advise116.php"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/5165"
      },
      {
        "trust": 1.7,
        "url": "http://www.iss.net/security_center/static/8961.php"
      },
      {
        "trust": 0.8,
        "url": "http://bvlive01.iss.net/issen/delivery/xforce/alertdetail.jsp?id=advise116"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/products_services/enterprise_protection/rsnetwork/sensor.php"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0601"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-0601"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/101915"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#101915"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4993"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200206-004"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0601"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#101915"
      },
      {
        "db": "VULHUB",
        "id": "VHN-4993"
      },
      {
        "db": "BID",
        "id": "4649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200206-004"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-0601"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-03-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#101915"
      },
      {
        "date": "2002-06-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-4993"
      },
      {
        "date": "2002-04-30T00:00:00",
        "db": "BID",
        "id": "4649"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      },
      {
        "date": "2002-06-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200206-004"
      },
      {
        "date": "2002-06-18T04:00:00",
        "db": "NVD",
        "id": "CVE-2002-0601"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-03-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#101915"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-4993"
      },
      {
        "date": "2002-04-30T00:00:00",
        "db": "BID",
        "id": "4649"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2002-000103"
      },
      {
        "date": "2006-08-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200206-004"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2002-0601"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200206-004"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The ISS RealSecure Network Sensor fails to properly process certain types of DHCP traffic.",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#101915"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200206-004"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…