lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061026223011.29321.qmail@securityfocus.com>
Date: 26 Oct 2006 22:30:11 -0000
From: security@...ichsoft.com
To: bugtraq@...urityfocus.com
Subject: vulnerability in Symantec products

Critical vulnerability was discovered in Symantec Internet Security 2005, posible afected products: Symantec Personal Firewall 2005, Symantec Internet Security 2004, Symantec Personal Firewall 2004,  Symantec Personal Firewall 2003, Symantec Internet Security 2006, Symantec Personal Firewall 2006.

Defective program feature allows to establish remote connections undetected - thus creating a perfect exploit for trojans and hacker activities. Symantec products generally have a rule "Default outbound NetBIOS", allowing programs to establish direct IP connections on ports 137, 138, 139. Therefore, trojan programs can undetectably bypass Symantec firewall and connect on these ports to attacker's remote server. However, resolving IP from DNS will be detected by the firewall.

Solutions:
- Disable "Default outbound NetBIOS" rule
- Modify "Default outbound NetBIOS" rule and restrict connections only to LAN

--------------------------------------------------
DimichSoft Security Group
http://www.dimichsoft.com/security.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ