Date: Wed, 20 Feb 2002 21:04:28 -0000
From: "Martin O'Neal" <BugTraq@corsaire.com.>
To: [email protected]Subject: Symantec Enterprise Firewall (SEF) SMTP proxy inconsistencies
-- Corsaire Limited Security Advisory --
Title: Symantec Enterprise Firewall (SEF) SMTP proxy inconsistencies
Date: 18.01.02
Application: Symantec Enterprise Firewall (SEF) 6.5.x
Environment: WinNT, Win2000
Author: Martin O'Neal [[email protected]]
Audience: General distribution
-- Scope --
The aim of this document is to clearly define some issues related to
a some SMTP proxy inconsistencies within the Symantec Enterprise
Firewall (SEF) environment as provided by Symantec [1].
-- History --
Vendor notified: 18.01.02
Document released: 21.02.02
-- Overview --
The SEF firewall product uses an application proxy strategy to provide
enhanced security features for a variety of common protocols. For the
SMTP proxy, part of this additional functionality allows the firewall
to restrict the sender / recipient domains and to hide internal
infrastructure information from external recipients.
However, when the firewall is configured to provide network address
translation (NAT) to an SMTP connection (effectively hiding the internal
server behind a publicly routable address), this might not always be
conducted as desired.
-- Analysis --
The SMTP proxy works by analysing the SMTP format and optionally rewriting
some of the headers to achieve the desired aim.
When an inbound or outbound SMTP connection is NATed to an address other
than the one assigned to the physical firewall interface, then the SMTP
proxy still uses the physical interface name and address within the SMTP
protocol exchange.
This has two potential issues:
The first issue is that there is now a potential information leak;
additional information is contained within the SMTP protocol exchange that
could aid an attacker in analysing the firewall configuration.
The second issue is that any receiving / sending host that is configured
to enforce strict checks on the SMTP protocol exchange, might not accept
the connection due to the inconsistencies in the fields.
-- Proof of concept --
To reproduce this issue, place an SMTP host on an internal interface of the
SEF firewall. Create a rule that allows inbound and outbound traffic to this
host, then create an address translation and redirection entry that maps
SMTP connections to and from an external address other than the physical
interface address.
smtp address (internal) 1.1.1.1 (twist.dance.org)
firewall address (external physical) 2.2.2.2 (waltz.dance.org)
firewall address (external SMTP NAT) 2.2.2.254 (foxtrot.dance.org)
firewall name tango
firewall domain dance.org
redirect 2.2.2.254 -> 1.1.1.1 (for SMTP only)
NAT 1.1.1.1 -> any (use 2.2.2.254)
NAT any -> 1.1.1.1 (use client address)
rule 1.1.1.1 -> any (for SMTP only)
rule any -> 1.1.1.1 (for SMTP only)
For inbound connections to 2.2.2.254:
-> 220 tango.dance.org Generic SMTP handler
For outbound connections from 2.2.2.254:
<- 220 ...
-> HELO waltz.dance.org
<- 250 ... talking to foxtrot.dance.org ([2.2.2.254])
-- Recommendations --
The SMTP proxy behaviour should be revised to resolve the information
within the protocol exchange to the correct host / address combination.
-- References --
[1] http://enterprisesecurity.symantec.com/products/products.cfm?ProductID
=47&PID=9674250&EID=0
-- Revision --
a. Initial release.
Copyright 2002 Corsaire Limited. All rights reserved.
-----------------------------------------------------------------------------------------------------------------------
CONFIDENTIALITY: This e-mail and any files transmitted with it are
confidential and intended solely for the use of the recipient(s) only.
Any review, retransmission, dissemination or other use of, or taking
any action in reliance upon this information by persons or entities
other than the intended recipient(s) is prohibited. If you have
received this e-mail in error please notify the sender immediately
and destroy the material whether stored on a computer or otherwise.
-----------------------------------------------------------------------------------------------------------------------
DISCLAIMER: Any views or opinions presented within this e-mail are
solely those of the author and do not necessarily represent those
of Corsaire Limited, unless otherwise specifically stated.
-----------------------------------------------------------------------------------------------------------------------
Corsaire Limited, 3 Tannery House, Tannery Lane, Send, Surrey, GU23 7EF
Telephone: +44(0)1483-226000 Email:[email protected]
This footnote confirms that this e-mail message has been swept by
MIMEsweeper for the presence of computer viruses.