TUCoPS :: Unix :: General :: border~1.txt


TUCoPS :: Unix :: General :: border~1.txt

Novell BorderManager Exploit

COMMAND
 Novell Border Manager
SYSTEMS AFFECTED
 Novell BorderManager 3.0
PROBLEM
 T. Ferony and George R. Johnson found following. To provide
 SSO-like capabilities for customers using BorderManger proxy
 server and the NetWare client, Novell uses a small program,
 ClientTrust, typically run from the user's login script. Once
 run, ClientTrust listens indefinitely on port 3024 for requests.
 Upon a user's initial attempt to access the web through
 BorderManager, BorderManager sends a "request" to the user's box
 in the form of UDP packets on port 3024. ClientTrust
 acknowledges this request, again via UDP. ClientTrust then works
 with the NetWare client to send BorderManager via NCP the
 currently logged in user's fully-qualified userid. BorderManager
 uses this userid for checks against its rulesets to deny or allow
 access to urls.
 The problem with this setup is twofold:
 1. BorderManager never verifies that the source of the access
 request and the source of the user information are the
 same.
 2. BorderManger relies on an as yet undetermined (by me,
 anyway) timeout before a user is considered no longer
 "authenticated".
 By exploiting this design, an unauthenticated user can access the
 web as any authenticated user. Things get really fun when victim
 users are members of the (insert your organization's list of
 trusted users) group granted full access to the web - not to
 mention the possibilities of making someone *really* look bad
 with attempts to forbidden pages. As a side note, it does have
 the pleasant side effect of being able to surf the web through
 the proxy server from your UN*X box.
 Exploit(s):
 1. Redirect port 3024 to another machine.
 Using a port redirector (in this case uredir was used), an
 attacker can redirect port 3024 to a victim's machine. When
 the attacker accesses the web (through the BorderManager
 proxy server) while running the redirector, the victim's
 ClientTrust validates the victim's user id to BorderManger on
 behalf of the attacker. Any web pages accessed by the
 attacker are done so with the victim's credentials. However,
 using this method, the attacker's IP address is recorded with
 the victim's userid in the proxy logs.
 2. Hijack the victim's session.
 Should an attacker successfully DoS the machine of a victim
 who's already authenticated to BorderManager, the attacker
 can surf as the victim by bringing up a machine with the
 victim's IP address. This method has the added benefit of
 stealth as proxy logs record the victim's IP and userid.
 3. Not really an exploit, merely a side effect?
 Users logged into M$ Terminal Server access the web as the
 person who first "authenticates" to BorderManager since the
 ClientTrust application is not designed to run correctly on
 multi-user hosts.
 Note: These exploits don't imply total circumvention of
 BorderManager rules. Rather, they indicate that through
 impersonation, an attacker can gain a more lenient set of
 rules if those rules exist.
SOLUTION
 Novell was notified of the problem and agreed that this was a
 design flaw, however, no patches to existing software have been
 released.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH

AltStyle によって変換されたページ (->オリジナル) /