CVE-1999-1582

By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:pix_firewall:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:31

Type Values Removed Values Added
References () http://www.cisco.com/warp/public/707/pixest-pub.shtml - () http://www.cisco.com/warp/public/707/pixest-pub.shtml -
References () http://www.kb.cert.org/vuls/id/6733 - US Government Resource () http://www.kb.cert.org/vuls/id/6733 - US Government Resource
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/8052 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/8052 -

Information

Published : 1998-07-15 04:00

Updated : 2024-11-20 23:31


NVD link : CVE-1999-1582

Mitre link : CVE-1999-1582

CVE.ORG link : CVE-1999-1582


JSON object : View

Products Affected

cisco

  • pix_firewall