exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Barracuda NG Firewall Remote Command Execution

Barracuda NG Firewall Remote Command Execution
Posted Jun 12, 2011
Authored by Lukas Nothdurfter, Wolfgang Neudorfer

It is possible to execute an arbitrary command with root privileges on phion netfence 4.0.x, phion netfence versions prior to 4.2.15 and NG Firewall versions prior to 5.0.2 boxes with activated external authentication scheme (i.e. Active Directory). An attacker with the knowledge of an admin's username is able to perform arbitrary shell commands during the ssh login procedure on the box. The knowledge of the admin's password is not required.

tags | advisory, arbitrary, shell, root
SHA-256 | fee59e2c3c8776e6ab9ed6abb4364a9562154ddc30dfed06de24b65179dd71f4

Barracuda NG Firewall Remote Command Execution

Change Mirror Download
Security Advisory
---------------------------------------
Vulnerable Software: Barracuda NG Firewall / phion netfence
Homepage: http://www.barracudanetworks.com/
Found by: Wolfgang Neudorfer, Lukas Nothdurfter
Impact: Remote Command Execution with root Privileges
Severity: Critical


Product Description
---------------------------------------
The Barracuda NG Firewall is a family of hardware and virtual appliances designed to protect network infrastructure, improve site-to-site connectivity and simplify administration of network operations. Beyond its powerful network firewall, IPS and VPN technologies, the Barracuda NG Firewall integrates a comprehensive set of next generation firewall technologies, including Layer 7 application control, WAN optimization, Web filtering, anti-virus, anti-spam and network access control enforcement.

[http://www.barracudanetworks.com/ns/products/ng_firewall_overview.php]


Vulnerability Description
---------------------------------------
It is possible to execute an arbitrary command with root privileges on phion netfence 4.0.x, phion netfence < 4.2.15 and NG Firewall < 5.0.2 boxes with activated external authentication scheme (i.e. Active Directory). An attacker with the knowledge of an admin's username is able to perform arbitrary shell commands during the ssh login procedure on the box. The knowledge of the admin's password is not required.


Proof-of-Concept
---------------------------------------
A proof-of-concept exploit will not be disclosed due to a responsible disclosure agreement with the vendor.


Severity
---------------------------------------
Because of the high impact and the broad range of vulnerable versions, the severity is considered to be critical.


Vulnerable Versions
---------------------------------------
phion netfence 4.0.x
phion netfence < 4.2.15
NG Firewall < 5.0.2


Patch
---------------------------------------
Hotfix 392_Authentication for netfence 4.0.x
Hotfix 390_Authentication for netfence 4.2.x
Hotfix 391_Authentication for NG Firewall 5.0.x


Contact Timeline
---------------------------------------
2011-03-14: Vendor informed
2011-03-15: Hotfixes available for download
2011-06-11: Responsible disclosure


References
---------------------------------------
www.monkey-cert.at
Login or Register to add favorites

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close