what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

VIGILANTE-2000005.txt

VIGILANTE-2000005.txt
Posted Aug 15, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Security Advisory - Watchguard Firebox Authentication dos vulnerability. Sending a malformed URL to tcp port 4100 causes Watchguard to shut down and require a reboot to restart. Fix available here.

tags | exploit, denial of service, tcp
SHA-256 | 14919ca4948fe3696698e353b783188ead84c819a08b964e581bbb6c4dfa3cc0

VIGILANTE-2000005.txt

Change Mirror Download
Watchguard Firebox Authentication DoS

Advisory Code: VIGILANTE-2000005

Release Date:
August 15, 2000

Systems Affected:
Tested on the newest version of the Watchguard Firebox II (that was on the
22nd of June), but it is very likely that this bug exists in all prior
versions that include the authentication service (TCP port 4100).

THE PROBLEM
Sending a malformed URL to the authentication service running on TCP port
4100, causes it to shut down and requires a reboot of the Watchguard for it
to work again.

Vendor Status:
Vendor was informed of the problem, and have been very cooperative in
getting a patch developed for the problem. According to the vendor the
problem is not caused by a buffer overflow.

Fix (quote from the vendor):
"all current WatchGuard LiveSecurity Subscribers have been
sent the Service Pack that addresses this issue. Copies of this
Service Pack can be downloaded from the WatchGuard LiveSecurity
Archive. To log into the archive, go to
http://www.watchguard.com/support. A work around that addresses the
vulnerability from the external interface is to disable Authentication
to the Firebox from the external interface. Upstream routers can also
be used to control access to this service if access to the
Authentication applet is required from the external interface and you
do not wish to install the patch. For obvious reasons, these are
sub-optimal solutions."

Vendor URL: http://www.watchguard.com
Product URL: http://www.watchguard.com/products/fIImss.asp

Copyright VIGILANTe 2000-08-15

Disclaimer:
The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.

Feedback:
Please send suggestions, updates, and comments to:

VIGILANTe
mailto: info@vigilante.com
http://www.vigilante.com

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close