The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Symantec Multiple Firewall TCP Options Denial Of Service Condition


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 25 Apr 2004 19:16:43 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [NT] Symantec Multiple Firewall TCP Options Denial Of Service Condition

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Symantec Multiple Firewall TCP Options Denial Of Service Condition
------------------------------------------------------------------------


SUMMARY

 
<http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=154>; Symantec Client Security provides "integrated AntiVirus, firewall, and intrusion detection capabilities managed through a central console to provide better and proactive protection against today's evolving blended threats, such as Blaster. The solution provides critical end-point security to prevent intrusions from entering or spreading from connected and non-connected remote and mobile users, as well as from critical systems."

A denial-of-service condition was found in Symantec's Client Firewall 
products. A remote attacker is able to render a system inoperable with a 
single TCP packet.

DETAILS

Vulnerable Systems:
 * Symantec Norton Internet Security 2003
 * Symantec Norton Internet Security 2004
 * Symantec Norton Internet Security Professional 2003
 * Symantec Norton Internet Security Professional 2004
 * Symantec Norton Personal Firewall 2003
 * Symantec Norton Personal Firewall 2004 
 * Symantec Client Firewall 5.01, 5.1.1 
 * Symantec Client Security 1.0

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0375>; 
CAN-2004-0375

The vulnerable code lies in the SYMNDIS.SYS driver when parsing TCP 
options of a received TCP packet. When an attacker supplies a single TCP 
packet with a TCP option of either SACK (05) or Alternate Checksum Data 
(0F) followed by a length of 00, the SYMNDIS.SYS driver enters an infinite 
loop and causes the operating system to "freeze up" to the point where it 
can no longer be accessed outside of the system itself nor can any part of 
the GUI be accessed including keyboard and mouse.

The only way to make the system operable again is by performing a hard 
boot that requires physical access. An attacker can invoke the DoS 
condition by sending a single TCP packet to any port, open or closed. Not 
only that, the condition is exploitable even if the Firewall/IDS is 
disabled. Follows is an example of a TCP SYN packet which can cause the 
DoS:

40 00 57 4B 00 00 01 01 05 00
|___| |___| |___| |_________|
  |     |     |        |
  |     |     |    TCP Options
  |     |  Urgent Pointer
  |  Checksum
Window Size

The vulnerable code maintains an offset into the TCP option bytes, and 
attempts to advance past a variable-length option by adding its length to 
the offset. ?If the option's length field is zero, then this will result 
in an infinite loop and the machine halts completely.

Vendor Status:
Symantec has released a patch for this vulnerability. The patch is 
available via the Symantec LiveUpdate service.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:dsoeder@eeye.com.> Derek 
Soeder - eEye Digital Security.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру