Plugin ID | 273 |
Plugin name | Symantec Raptor Firewall 6.5 Security Gateway ftp server detection |
Plugin filename | Symantec Raptor Firewall 6.5 Security Gateway ftp server detection.plugin |
Plugin filesize | 2257 bytes |
Plugin family | Firewalls |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/11/12 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 21 |
Plugin procedure detection | open|sleep|close|pattern_exists 220 Secure Gateway FTP server ready. |
Plugin detection accuracy | 90 |
Plugin comment | See ATK plugin 198 for a similar Raptor test. |
Bug affected | Symantec Raptor Firewall 6.5 |
Bug not affected | Other solutions and maybe the newer Symantec Enterprise Firewall 7.x |
Bug vulnerability class | Configuration |
Bug description | The target host seems to be a Symantec Raptor Firewall 6.5 with a running Security Gateway ftp server. The server banner is always "Secure Gateway FTP server". An attacker may use this information to start further investigation or dedicated attacks. |
Bug solution | You should upgrade your Symantec Raptor Firewall 6.5 to the new Symantec Enterprise Firewall 7.x or newer. Also limit unwanted connections and communications with ACL and firewalling. A filter may prevent such an enumeration at an external interface. |
Bug fixing time | Approx. 45 minutes |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 6 |
Bug simplicity | 7 |
Bug impact | 6 |
Bug risk | 7 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |