Vulnerability Name: | CCN-530 | ||||||
Published: | 1997-06-01 | ||||||
Updated: | 1997-06-01 | ||||||
Summary: | Windows NT Routing and RAS Service does not support the concept of established connections, whereby one rule can be used to permit or deny two way communication over any protocol to any host. This allows an attacker to bypass filtering rules and possibly force processes to terminate, or to flood the affected ports. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: Fyodor's Exploit World Many RAS Service packet filtering rules are insecure Source: CCN Type: NTBugTraq Mailing List, Thu, 26 Jun 1997 12:24:11 -0400 Alert: Routing and RAS Filtering issue Source: XF Type: UNKNOWN nt-filter(530) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |