[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products



 Rigel Kent Security & Advisory Services Inc
 http://www.rigelksecurity.com
 Advisory # RK-001-04
 Mike Sues
 September 22, 2004
"Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security
Products"
 Platform : Symantec Enterprise Firewall/VPN Appliances
 100, 200, 200R
 Symantec Gateway Security 320
 Symantec Gateway Security 320, 360, 360R
 
 Version : 100, 200, 200R
 Prior to firmware build 1.63
 320, 360, 360R
 Prior to build 622
 Configuration : Default
 
Abstract:
========
 Three high-risk vulnerabilities have been identified in the Symantec
 Enterprise Firewall products and two in the Gateway products. All are
 remotely exploitable and allow an attacker to perform a denial of service
 attack against the firewall, identify active services in the WAN interface
 and exploit one of these services to collect and alter the firewall or
 gateway's configuration.
Vulnerabilities:
===============
 Issue RK-001-04-01:
 Denial of service caused by a fast UDP port scan
 Severity:
 High
 Description:
 A fast map UDP port scan against all ports (i.e. 1-65535) on the WAN
 interface of the firewall will cause the firewall to lock up and
stop
 responding. Turning the power off and on will reset the firewall.
 The Gateway Security products are not affected by this issue.
 Countermeasure:
 Install firmware build 1.63
 Issue RK-001-04-02:
 Filter bypass on WAN interface
 Severity:
 High
 Description:
 A UDP port scan against the WAN interface of the firewall from a
source
 port of UDP 53 bypasses filter on WAN interface and exposes the
following
 active services,
 tftpd
 snmpd
 isakmp
 All other ports are reported as closed. 
 Countermeasure:
 100, 200, 200R
 Install firmware build 1.63
 320, 360, 360R
 Install firmware build 622
 Issue RK-001-04-03:
 Default read/write community string on SNMP service
 Severity:
 High
 Description:
 The default read/write community string used by the firewall is
public,
 allowing an attacker to collect and alter the firewall's
configuration.
 By combining this with RK-001-04-02, an attacker is able to exploit
this
 against the WAN interface by sending SNMP GET/SET requests whose
source
 port is UDP 53.
 Moreover, the administrative interface for the firewall does not
allow the
 operator to disable the service nor change the community strings. 
 Countermeasure:
 100, 200, 200R
 Install firmware build 1.63
 320, 360, 360R
 Install firmware build 622
Credits:
=======
 Rigel Kent Security & Advisory Services would like to thank Symantec for
 their prompt response and action.

AltStyle によって変換されたページ (->オリジナル) /