The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Kerio Personal Firewall Multiple IP Options DoS


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 11 Nov 2004 18:34:51 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [NT] Kerio Personal Firewall Multiple IP Options DoS

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Kerio Personal Firewall Multiple IP Options DoS
------------------------------------------------------------------------


SUMMARY

" <http://www.kerio.com/kpf_home.html>; Kerio Personal Firewall (KPF) helps 
users control how their computers exchange data with other computers on 
the Internet or local network."

A machine running Kerio Personal Firewall can be rendered inoperable and 
frozen due to a single packet from a malicious party. Physical access is 
then required in order to secure control of the machine again.

DETAILS

Vulnerable Systems:
 * Kerio Personal Firewall version 4.1.1 and prior

Immune Systems:
 * Kerio Personal Firewall version 4.1.2

The DoS flaw exists within the low-level component that handles TCP, UDP 
and ICMP packets. The vulnerability exists in FWDRV.SYS when trying to 
parse through the IP Options in a TCP, UDP, or ICMP packet. When an 
attacker supplies a single TCP, UDP, or ICMP packet with an IP Option 
followed by a length of 0x00, the FWDRV.SYS driver enters an infinite loop 
and causes the operating system to "freeze up" to the point where it can 
no longer be accessed outside of the system itself nor can any part of the 
GUI be accessed including keyboard and mouse.

Note: The only way to bring the system back online is to hard boot the 
system which requires physical access.

The attacker only needs to send a single packet to any port on the system 
regardless of whether or not the port is open. This flaw is still 
accessible even if the firewall is set to "stop all traffic" because it 
still continues to process packets.

The vulnerable code maintains an offset into the IP option bytes, and 
attempts to advance past a variable-length option by adding its length to 
the offset. If the option's length field is zero, then this will result in 
an infinite loop and the machine halts completely. It should be noted that 
since there is not a state requirement for performing this attack, it is 
possible to spoof a TCP, UDP, or ICMP packet. This results in an 
attacker's ability to remain anonymous.

Vendor Status:
Kerio have fixed the vulnerability and have provided an updated version 
(4.1.2) available from their site at  
<http://www.kerio.com/kpf_download.html>; 
http://www.kerio.com/kpf_download.html

Disclosure Timeline:
30-10-2004   Vulnerability reported
09-11-2004   Release date


ADDITIONAL INFORMATION

The information has been provided by  <mailto:mmaiffret@eeye.com.> Marc 
Maiffret of eEye Digital Security.
The original article can be found at:  
<http://www.kerio.com/security_advisory.html>; 
http://www.kerio.com/security_advisory.html




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру