[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060605115254.30457.qmail@securityfocus.com>
Date: 5 Jun 2006 11:52:54 -0000
From: mac68k@...il.com
To: bugtraq@...urityfocus.com
Subject: [Kil13r-SA-20060605] Syworks SafeNET Policy File Vulnerability
Title:
[Kil13r-SA-20060605] Syworks SafeNET Policy File Vulnerability
Author:
Kil13r - http://www.kil13r.info/
Local / Remote:
Local
Timeline:
2006/04/18 - Discovery
2006/06/05 - Release
Affected version:
All version of Syworks SafeNET
Not affected version:
In this time, none
Description:
Syworks SafeNET is network resource protection solution which organized by client/server, but that has serious vulnerability.
It has client policy file that can be modified by end user.
In file of policy.dat
08h to 16h: Ascii value of Syworks SafeNET server address
18h: The switch of Syworks SafeNET client (On: 0x01, Off: 0x00)
1ch to 1dh: ICMP limit (0x0000 to 0xFFFF)
20h to 21h: Broadcast limit (0x0000 to 0xFFFF)
24h to 25h: Session limit (0x0000 to 0xFFFF)
28h: Session limit violation allowed time (0x00 to 0xFF)
2ah: The switch which blocking continuous violation (On: 0x01, Off: 0x00)
2ch: Continuous violation allowed time (0x00 to 0xFF)
2fh: The switch which warning continuous violation (On: 0x01, Off: 0x00)
31h: The switch which disallowing Syworks SafeNET client termination by end user (On: 0x01, Off: 0x00)
33h: The switch which disallowing Syworks SafeNET client icon in tray (On: 0x01, Off: 0x00)
3eh to 41h: Problem autoreport interval (0x00000000 to 0xFFFFFFFF)
If attacker modify client policy file, attacker can consume all of network resource.
Proof of Concept code:
None
Proof of Concept example:
None
Proof of Concept screenshot:
None
Powered by blists - more mailing lists