Vulnerability Details : CVE-2005-2317
Shorewall 2.4.x before 2.4.1, 2.2.x before 2.2.5, and 2.0.x before 2.0.17, when MACLIST_TTL is greater than 0 or MACLIST_DISPOSITION is set to ACCEPT, allows remote attackers with an accepted MAC address to bypass other firewall rules or policies.
Products affected by CVE-2005-2317
- cpe:2.3:a:shorewall:shorewall:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.0a:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.0b:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.2e:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.2f:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.3a:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.4.0_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.4.0_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.2b:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.2d:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.3b:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.2a:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.2c:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.3c:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:shorewall:shorewall:2.2.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2317
0.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2317
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-2317
-
http://www.debian.org/security/2005/dsa-849
[SECURITY] [DSA 849-1] New shorewall packages fix firewall bypass
-
http://shorewall.net/News.htm#20050717
Patch;Vendor Advisory
-
http://www.ubuntu.com/usn/usn-197-1
USN-197-1: Shorewall vulnerability | Ubuntu security notices | Ubuntu
-
http://www.gentoo.org/security/en/glsa/glsa-200507-20.xml
Shorewall: Security policy bypass (GLSA 200507-20) — Gentoo security
-
http://www.securityfocus.com/bid/14292
-
http://seclists.org/lists/fulldisclosure/2005/Jul/0409.html
Full Disclosure: Shorewall MACLIST ProblemPatch;Vendor Advisory
Jump to