lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000701c4a0d4$fe7e0880$6401a8c0@neuromancer>
Date: Wed, 22 Sep 2004 14:50:12 -0400
From: "Mike Sues" <msues@...elksecurity.com>
To: <bugtraq@...urityfocus.com>, <firewalls@...urityfocus.com>,
	<pen-test@...urityfocus.com>, <vuln-dev@...urityfocus.com>
Subject: Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products



               Rigel Kent Security & Advisory Services Inc
		       http://www.rigelksecurity.com

                       Advisory # RK-001-04

                            Mike Sues
                       September 22, 2004


"Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security
Products"


  Platform	:	Symantec Enterprise Firewall/VPN Appliances
			100, 200, 200R
			Symantec Gateway Security 320
			Symantec Gateway Security 320, 360, 360R
			
  Version	:     100, 200, 200R
				Prior to firmware build 1.63
			320, 360, 360R
				Prior to build 622

  Configuration	:	Default
  	

Abstract:
========

  Three high-risk vulnerabilities have been identified in the Symantec
  Enterprise Firewall products and two in the Gateway products. All are
  remotely exploitable and allow an attacker to perform a denial of service
  attack against the firewall, identify active services in the WAN interface
  and exploit one of these services to collect and alter the firewall or
  gateway's configuration.


Vulnerabilities:
===============


  Issue RK-001-04-01:
	Denial of service caused by a fast UDP port scan
    Severity:
	High
    Description:
	A fast map UDP port scan against all ports (i.e. 1-65535) on the WAN
	interface of the firewall will cause the firewall to lock up and
stop
	responding. Turning the power off and on will reset the firewall.

	The Gateway Security products are not affected by this issue.
    Countermeasure:
	Install firmware build 1.63



  Issue RK-001-04-02:
	Filter bypass on WAN interface
    Severity:
	High
    Description:
	A UDP port scan against the WAN interface of the firewall from a
source
	port of UDP 53 bypasses filter on WAN interface and exposes the
following
	active services,

		tftpd
		snmpd
		isakmp

	All other ports are reported as closed. 
    Countermeasure:
	100, 200, 200R
		Install firmware build 1.63
	320, 360, 360R
		Install firmware build 622



  Issue RK-001-04-03:
	Default read/write community string on SNMP service
    Severity:
	High
    Description:
	The default read/write community string used by the firewall is
public,
	allowing an attacker to collect and alter the firewall's
configuration.
	By combining this with RK-001-04-02, an attacker is able to exploit
this
	against the WAN interface by sending SNMP GET/SET requests whose
source
	port is UDP 53.

	Moreover, the administrative interface for the firewall does not
allow the
	operator to disable the service nor change the community strings. 
    Countermeasure:
	100, 200, 200R
		Install firmware build 1.63
	320, 360, 360R
		Install firmware build 622


Credits:
=======

  Rigel Kent Security & Advisory Services would like to thank Symantec for
  their prompt response and action.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ