| Vulnerability Name: | CVE-2004-2176 (CCN-17711) | ||||||||
| Assigned: | 2004-10-13 | ||||||||
| Published: | 2004-10-13 | ||||||||
| Updated: | 2008-09-05 | ||||||||
| Summary: | The Internet Connection Firewall (ICF) in Microsoft Windows XP SP2 is configured by default to trust sessmgr.exe, which allows local users to use sessmgr.exe to create a local listening port that bypasses the ICF access controls. | ||||||||
| CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2004-2176 Source: CCN Type: Microsoft Knowledge Base Article 843090 Description of the Windows Firewall feature in Windows XP Service Pack 2 Source: CCN Type: OSVDB ID: 19185 Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass Source: CCN Type: Securiteam Mailing List Security Holes & Exploits 10/13/2004 Writing Trojans that Bypass Windows XP Service Pack 2 Firewall Source: BUGTRAQ Type: UNKNOWN 20041012 Writing Trojans that bypass Windows XP Service Pack 2 Firewall Source: BID Type: Exploit 11410 Source: CCN Type: BID-11410 Microsoft Windows XP Weak Default Configuration Vulnerability Source: XF Type: UNKNOWN winxp-firewall-bypass(17711) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||