VAR-200212-0449

Vulnerability from variot - Updated: 2025-04-03 22:27

Symantec Norton Personal Firewall 2002 allows remote attackers to bypass the portscan protection by using a (1) SYN/FIN, (2) SYN/FIN/URG, (3) SYN/FIN/PUSH, or (4) SYN/FIN/URG/PUSH scan. Symantec Norton Personal Firewall 2002 (NPW)is a firewall solution for home and small office machines based on some versions of the Microsoft Windows operating systems. It has a variety of features, including the ability to detect and dynamically block portscans. An issue has been reported with the manner in which Personal Firewall 2002 handles portscans. Reportedly, only SYN scans are detected. An attacker may scan with a variety of other methods, including SYN/FIN packets and evade the protective features of NPW. This issue may affect Norton Internet Security 2002, however this has not been confirmed

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200212-0449",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "norton personal firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2002"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "4521"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1778"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Alfonso Fiore\u203b afiore@secure-edge.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2002-1778",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2002-1778",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.1,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-6161",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2002-1778",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200212-104",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-6161",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2002-1778",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6161"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-1778"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1778"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Symantec Norton Personal Firewall 2002 allows remote attackers to bypass the portscan protection by using a (1) SYN/FIN, (2) SYN/FIN/URG, (3) SYN/FIN/PUSH, or (4) SYN/FIN/URG/PUSH scan. Symantec Norton Personal Firewall 2002 (NPW)is a firewall solution for home and small office machines based on some versions of the Microsoft Windows operating systems. It has a variety of features, including the ability to detect and dynamically block portscans. \nAn issue has been reported with the manner in which Personal Firewall 2002 handles portscans. Reportedly, only SYN scans are detected. An attacker may scan with a variety of other methods, including SYN/FIN packets and evade the protective features of NPW. \nThis issue may affect Norton Internet Security 2002, however this has not been confirmed",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-1778"
      },
      {
        "db": "BID",
        "id": "4521"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6161"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-1778"
      }
    ],
    "trust": 1.35
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "4521",
        "trust": 2.1
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1778",
        "trust": 1.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "8859",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "2626",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-6161",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-1778",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6161"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-1778"
      },
      {
        "db": "BID",
        "id": "4521"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1778"
      }
    ]
  },
  "id": "VAR-200212-0449",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6161"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:27:21.923000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-1778"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://securityresponse.symantec.com/avcenter/security/content/2002.05.16.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/4521"
      },
      {
        "trust": 1.2,
        "url": "http://online.securityfocus.com/archive/1/267850"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8859"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/8859"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/2626"
      },
      {
        "trust": 0.3,
        "url": "http://www.symantec.com/sabu/nis/npf/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=3622"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6161"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-1778"
      },
      {
        "db": "BID",
        "id": "4521"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1778"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-6161"
      },
      {
        "db": "VULMON",
        "id": "CVE-2002-1778"
      },
      {
        "db": "BID",
        "id": "4521"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1778"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2002-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6161"
      },
      {
        "date": "2002-12-31T00:00:00",
        "db": "VULMON",
        "id": "CVE-2002-1778"
      },
      {
        "date": "2002-04-16T00:00:00",
        "db": "BID",
        "id": "4521"
      },
      {
        "date": "2002-04-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      },
      {
        "date": "2002-12-31T05:00:00",
        "db": "NVD",
        "id": "CVE-2002-1778"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6161"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2002-1778"
      },
      {
        "date": "2002-04-16T00:00:00",
        "db": "BID",
        "id": "4521"
      },
      {
        "date": "2019-12-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2002-1778"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Symantec Norton Personal Firewall 2002 Security hole",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200212-104"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…