{"vuid":"VU#760256","idnumber":"760256","name":"The ActiveX and HTML file browsers of the Symantec 4400 Series Clientless VPN Gateway contains various unspecified vulnerabilities","keywords":["Symantec","4400 series clientless VPN gateways","ActiveX","HTML"],"overview":"The ActiveX and HTML file browsers in the Symantec Clientless VPN Gateway 4400 Series contain various unspecified vulnerabilities.","clean_desc":"The Symantec Clientless VPN Gateway 4400 Series is a stand-alone security appliance for connecting remote users to a trusted network via a virtual private network. The ActiveX and HTML file browsers included with the 4400 Series VPN Gateway contain various vulnerabilities. The specifics of the vulnerabilities are not known.","impact":"These vulnerabilities may result in unauthorized access to the system or lead to unpredictable behavior.","resolution":"Apply a Hotfix Symantec has posted a hotfix to address this issue. The hotfix is labeled Hotfix: SCVG5-20040806-00 and can be located at: ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/SCVG5-20040806-00.tgz The README file describing this hotfix is available here.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Symantec","author":"This document was written by Jeff Gennari.","public":["http://secunia.com/advisories/12254/","http://www.securitytracker.com/alerts/2004/Aug/1010918.html","http://securityresponse.symantec.com/avcenter/security/Content/2004.08.13.html","ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/hf3-readme.txt","http://www.osvdb.org/displayvuln.php?osvdb_id=8508"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-08-11T13:54:12Z","publicdate":"2004-08-10T00:00:00Z","datefirstpublished":"2004-10-20T17:27:14Z","dateupdated":"2004-10-20T17:52:52Z","revision":75,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"2","cam_population":"3","cam_impact":"5","cam_easeofexploitation":"10","cam_attackeraccessrequired":"13","cam_scorecurrent":"0.6215625","cam_scorecurrentwidelyknown":"0.804375","cam_scorecurrentwidelyknownexploited":"1.535625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.6215625,"vulnote":null}