Reported December 13, 2000 by WatchGuard

VERSIONS AFFECTED
  • WatchGuard SOHO Firewall 2.2 and earlier

DESCRIPTION

Multiple vulnerabilities have been discovered in WatchGuard SOHO Firewall 2.2 and earlier:

1.  A malicious attacker can access sensitive configuration remotely.

2.      An attacker can use a remotely exploitable buffer overflow and apply excessively long HTTG GET requests to launch arbitrary code.

3.      An attacker can cause a Denial of Service (DoS) attack by sending fragmented packets.

4.      A malicious attacker can use the POST command to reset the SOHO Firewall Password without authentication.

VENDOR RESPONSE

WatchGuard has issued a revised version 2.2.1 that is not vulnerable to these attacks.  Customers should contact WatchGuard for an upgrade.  http://www.watchguard.com

CREDIT
Discovered by
ISS X-Force