exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Barracuda NG Firewall Remote Command Execution

Barracuda NG Firewall Remote Command Execution
Posted Jun 12, 2011
Authored by Lukas Nothdurfter, Wolfgang Neudorfer

It is possible to execute an arbitrary command with root privileges on phion netfence 4.0.x, phion netfence versions prior to 4.2.15 and NG Firewall versions prior to 5.0.2 boxes with activated external authentication scheme (i.e. Active Directory). An attacker with the knowledge of an admin's username is able to perform arbitrary shell commands during the ssh login procedure on the box. The knowledge of the admin's password is not required.

tags | advisory, arbitrary, shell, root
SHA-256 | fee59e2c3c8776e6ab9ed6abb4364a9562154ddc30dfed06de24b65179dd71f4

Barracuda NG Firewall Remote Command Execution

Change Mirror Download
Security Advisory
---------------------------------------
Vulnerable Software: Barracuda NG Firewall / phion netfence
Homepage: http://www.barracudanetworks.com/
Found by: Wolfgang Neudorfer, Lukas Nothdurfter
Impact: Remote Command Execution with root Privileges
Severity: Critical


Product Description
---------------------------------------
The Barracuda NG Firewall is a family of hardware and virtual appliances designed to protect network infrastructure, improve site-to-site connectivity and simplify administration of network operations. Beyond its powerful network firewall, IPS and VPN technologies, the Barracuda NG Firewall integrates a comprehensive set of next generation firewall technologies, including Layer 7 application control, WAN optimization, Web filtering, anti-virus, anti-spam and network access control enforcement.

[http://www.barracudanetworks.com/ns/products/ng_firewall_overview.php]


Vulnerability Description
---------------------------------------
It is possible to execute an arbitrary command with root privileges on phion netfence 4.0.x, phion netfence < 4.2.15 and NG Firewall < 5.0.2 boxes with activated external authentication scheme (i.e. Active Directory). An attacker with the knowledge of an admin's username is able to perform arbitrary shell commands during the ssh login procedure on the box. The knowledge of the admin's password is not required.


Proof-of-Concept
---------------------------------------
A proof-of-concept exploit will not be disclosed due to a responsible disclosure agreement with the vendor.


Severity
---------------------------------------
Because of the high impact and the broad range of vulnerable versions, the severity is considered to be critical.


Vulnerable Versions
---------------------------------------
phion netfence 4.0.x
phion netfence < 4.2.15
NG Firewall < 5.0.2


Patch
---------------------------------------
Hotfix 392_Authentication for netfence 4.0.x
Hotfix 390_Authentication for netfence 4.2.x
Hotfix 391_Authentication for NG Firewall 5.0.x


Contact Timeline
---------------------------------------
2011-03-14: Vendor informed
2011-03-15: Hotfixes available for download
2011-06-11: Responsible disclosure


References
---------------------------------------
www.monkey-cert.at
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close