Date: Wed, 22 Sep 2004 14:50:12 -0400
From: Mike Sues <msues@rigelksecurity.com.>
To: [email protected], [email protected],
Subject: Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products
Rigel Kent Security & Advisory Services Inc
http://www.rigelksecurity.com
Advisory # RK-001-04
Mike Sues
September 22, 2004
"Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway =
Security
Products"
Platform : Symantec Enterprise Firewall/VPN Appliances
100, 200, 200R
Symantec Gateway Security 320
Symantec Gateway Security 320, 360, 360R
=09
Version : 100, 200, 200R
Prior to firmware build 1.63
320, 360, 360R
Prior to build 622
Configuration : Default
=09
Abstract:
=3D=3D=3D=3D=3D=3D=3D=3D
Three high-risk vulnerabilities have been identified in the Symantec
Enterprise Firewall products and two in the Gateway products. All are
remotely exploitable and allow an attacker to perform a denial of =
service
attack against the firewall, identify active services in the WAN =
interface
and exploit one of these services to collect and alter the firewall or
gateway's configuration.
Vulnerabilities:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Issue RK-001-04-01:
Denial of service caused by a fast UDP port scan
Severity:
High
Description:
A fast map UDP port scan against all ports (i.e. 1-65535) on the WAN
interface of the firewall will cause the firewall to lock up and
stop
responding. Turning the power off and on will reset the firewall.
The Gateway Security products are not affected by this issue.
Countermeasure:
Install firmware build 1.63
Issue RK-001-04-02:
Filter bypass on WAN interface
Severity:
High
Description:
A UDP port scan against the WAN interface of the firewall from a
source
port of UDP 53 bypasses filter on WAN interface and exposes the
following
active services,
tftpd
snmpd
isakmp
All other ports are reported as closed.=20
Countermeasure:
100, 200, 200R
Install firmware build 1.63
320, 360, 360R
Install firmware build 622
Issue RK-001-04-03:
Default read/write community string on SNMP service
Severity:
High
Description:
The default read/write community string used by the firewall is
public,
allowing an attacker to collect and alter the firewall's
configuration.
By combining this with RK-001-04-02, an attacker is able to exploit
this
against the WAN interface by sending SNMP GET/SET requests whose
source
port is UDP 53.
Moreover, the administrative interface for the firewall does not
allow the
operator to disable the service nor change the community strings.=20
Countermeasure:
100, 200, 200R
Install firmware build 1.63
320, 360, 360R
Install firmware build 622
Credits:
=3D=3D=3D=3D=3D=3D=3D
Rigel Kent Security & Advisory Services would like to thank Symantec =
for
their prompt response and action.