Symantec Raptor Firewall 6.5 Security Gateway ftp server detection 1.0
 
Plugin ID273
Plugin nameSymantec Raptor Firewall 6.5 Security Gateway ftp server detection
Plugin filenameSymantec Raptor Firewall 6.5 Security Gateway ftp server detection.plugin
Plugin filesize2257 bytes
Plugin familyFirewalls
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/11/12
Plugin version1.0
Plugin protocoltcp
Plugin port21
Plugin procedure detectionopen|sleep|close|pattern_exists 220 Secure Gateway FTP server ready.
Plugin detection accuracy90
Plugin commentSee ATK plugin 198 for a similar Raptor test.
Bug affectedSymantec Raptor Firewall 6.5
Bug not affectedOther solutions and maybe the newer Symantec Enterprise Firewall 7.x
Bug vulnerability classConfiguration
Bug descriptionThe target host seems to be a Symantec Raptor Firewall 6.5 with a running Security Gateway ftp server. The server banner is always "Secure Gateway FTP server". An attacker may use this information to start further investigation or dedicated attacks.
Bug solutionYou should upgrade your Symantec Raptor Firewall 6.5 to the new Symantec Enterprise Firewall 7.x or newer. Also limit unwanted connections and communications with ACL and firewalling. A filter may prevent such an enumeration at an external interface.
Bug fixing timeApprox. 45 minutes
Bug exploit availabilityYes
Bug remoteYes
Bug localYes
Bug severityMedium
Bug popularity6
Bug simplicity7
Bug impact6
Bug risk7
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.