Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55558
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-197-1 (shorewall)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to shorewall
announced via advisory USN-197-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected: shorewall

A firewall bypass vulnerability has been found in shorewall. If
MACLIST_TTL was set to a value greater than 0 or MACLIST_DISPOSITION
was set to ACCEPT in /etc/shorewall/shorewall.conf, and a client was
positively identified through its MAC address, that client bypassed
all other policies/rules in place. This could allow external computers
to get access to ports that are intended to be restricted by the
firewall policy.

Please note that this does not affect the default configuration, which
does not enable MAC based client identification.

Solution:
The problem can be corrected by upgrading the affected package to
version 2.0.2-4ubuntu2.1 (for Ubuntu 4.10), or 2.0.13-1ubuntu0.1 (for
Ubuntu 5.04). In general, a standard system upgrade is sufficient to
effect the necessary changes.
http://www.securityspace.com/smysecure/catid.html?in=USN-197-1

Risk factor : High

CVSS Score:
7.5

Cross-Ref: BugTraq ID: 14292
Common Vulnerability Exposure (CVE) ID: CVE-2005-2317
http://www.securityfocus.com/bid/14292
Debian Security Information: DSA-849 (Google Search)
http://www.debian.org/security/2005/dsa-849
http://seclists.org/lists/fulldisclosure/2005/Jul/0409.html
http://www.gentoo.org/security/en/glsa/glsa-200507-20.xml
http://secunia.com/advisories/16087
http://secunia.com/advisories/17110
http://secunia.com/advisories/17113
http://www.ubuntu.com/usn/usn-197-1
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.