lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <41D3D2B8.2010504@xmcopartners.com> From: fcharpen at xmcopartners.com (Frederic Charpentier) Subject: Multiple Backdoors found in eEye Products (IRIS and SecureIIS) Hi. does anyone confirm the info ? Fred. Lance Gusto wrote: > Multiple Backdoors found in eEye Products (IRIS and SecureIIS) > L. Gusto <thegusto22@...mail.com> > > > Summary: > > During meticulous testing of both eEye's IRIS and SecureIIS products, > we (my testing team) have discovered multiple backdoors in the latest of > both mentioned products and some older versions we could acquire. > > > These backdoors are very cleverly hidden (kudos to the authors), I > personally don't condone illegally backdooring commercial products, > and personally I don't think much of eEye but I must give credit to > where credit is due. > > > We have tested IRIS 3.7 and up they all appear to have a backdoor. > We have verified the IRIS backdoor doesn't exist in versions prior > to 3.0 > > > We have tested SecureIIS 2.0 and up they all appear to have a backdoor. > We have verified that SecureIIS 1.x series does not have this specific > backdoor. > > Bringing the backdoors to light: > > After long testing we discovered the exact sequences used to active > the backdoor. Unfortunately, we can't release the "exploits" publically > due to the severity of these flaws. But incomplete examples will > be given. > > > > The IRIS Backdoor: > > This one is quite interesting. We have discovered that sending a > specifically crafted UDP datagram to a IRIS host *directly* (not > through the wire or to host on the network segment) with certain IP > options set and a certain magic value at a undisclosed offset in the > payload will bind a shell to the source port specified in the UDP datagram. > > [snip] > > > The SecureIIS Backdoor: > > The SecureIIS backdoor was alot easier to discover but very well > placed. The SecureIIS backdoor is triggered by a specifically > crafted HTTP HEAD request. Here is a incomplete layout of how > to exploit this: > > > HEAD /<24 byte constant string>/PORT_ADDRESS.ASP HTTP/1.1 > > PORT - Will be the port to bind a shell. > ADDRESS - Address for priority binding (0 - For any). > > > [snip] > > > > Local Deduction: > > There are a two possiblilites here, either eEye's code has been > altered by some attacker or this has been sanctioned by the > company (or at least the developers were fully aware of this). > > > > Conclusion: > > It is very very shameful that a somewhat reputable like eEye is acting > in a very childish, unprofessional manner. I figure that is why the > code is closed source. There are several active exploits available that I > (the author of this advisory) didn't create floating around. The only > logical solution will be to not use the mentioned eEye products for the > time being or at least downgrade to the non-backdoored versions. > > We will be investigation eEye's Blink Product for any clandestine > backdoors. > > _________________________________________________________________ > FREE pop-up blocking with the new MSN Toolbar ? get it now! > http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/ > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > -- _______________________________________ Frederic Charpentier - Xmco Partners Security Consulting / Pentest web : http://www.xmcopartners.com
Powered by blists - more mailing lists