exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Internet Security Systems Security Advisory December 14, 2000

Internet Security Systems Security Advisory December 14, 2000
Posted Dec 15, 2000
Site xforce.iss.net

WatchGuard SOHO is an appliance firewall device targeted at small to mid-sized companies that wish to connect their network to the Internet. ISS X-Force discovered the following vulnerabilities in the SOHO Firewall that may allow an attacker to compromise or deny service to the device:

tags | remote, vulnerability
SHA-256 | 8cc47b08e479f3101cc3f6ca9d94c2fd332658761e4a019a84429b4c8c47abfb

Internet Security Systems Security Advisory December 14, 2000

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Advisory
December 14, 2000

Multiple vulnerabilities in the WatchGuard SOHO Firewall

Synopsis:

WatchGuard SOHO is an appliance firewall device targeted at small
to mid-sized companies that wish to connect their network to the
Internet. ISS X-Force discovered the following vulnerabilities in the
SOHO Firewall that may allow an attacker to compromise or deny service
to the device:


1. Weak Authentication
2. GET Request Buffer Overflow
3. Fragmented IP Packet Attack
4. Password Reset Using POST Operation


Impact:

These vulnerabilities could allow a remote attacker to gain access to
the administrative functions of the firewall without authenticating,
crash the configuration server, or cause the device to stop accepting
network traffic.

Affected Versions:

WatchGuard SOHO Firewall with Firmware 1.6.0
WatchGuard SOHO Firewall with Firmware 2.1.3 (Issue 4 only)


Description:

1. Weak Authentication
By default, WatchGuard SOHO firewalls spawn an HTTP-compliant Web
server that is used to configure the device from a standard Web
browser. The service listens for connections originating from the
private network since many of the configuration options are sensitive
to the network's security. To protect the configuration server from
unauthorized tampering from the private network, the administrator can
enable a username and password that must be used to access the server.
However, this authentication is only enforced on the HTML interface
used to control the firewall, not on the objects that actually
implement the various features.

An attacker can directly request these objects and change the
administrative password or reboot the firewall without knowledge of
the username or password.

2. GET Request Buffer Overflow
An excessively long GET request to the Web server causes the
WatchGuard SOHO configuration server to crash, requiring a reboot to
regain functionality. X-Force has not yet determined if this
vulnerability could be leveraged to execute arbitrary code. However,
this buffer overflow does not yield any additional access beyond what
can be obtained from the weak authentication vulnerability.

3. Fragmented IP packet attack
A large volume of fragmented IP packets directed at the SOHO firewall
exhausts the device's resources, causing it to stop forwarding packets
between interfaces and drop all connections. Rebooting the device is
the only means to restore connectivity between the private and public
networks.

4. Password Reset using POST Operation
WatchGuard SOHO firmware 2.1.3 allows an administrator to set a
password, which is required to access the configuration server's
HTML interface as well as the underlying objects that implement the
various configuration options. However, making a blank unauthenticated
request to the /passcfg object will remove the password, allowing access
to any of the administrative functions without the username/password
combination.

Recommendations:

WatchGuard recommends upgrading to version 2.2.1 to eliminate these
vulnerabilities.

Latest versions of WatchGuard can be accessed at:
http://bisd.watchguard.com/SOHO/Downloads/swupdates.asp

The ISS SAFEsuite assessment software, Internet Scanner, will be
updated to detect these vulnerabilities in an upcoming X-Press Update.

Additional Information:

The Common Vulnerabilities and Exposures (CVE) project has assigned
the following names to these issues. These are candidates for
inclusion in the CVE list (http://cve.mitre.org), which standardizes
names for security problems.

CAN-2000-0894 Weak authentication and Password Reset using POST Operation
CAN-2000-0895 GET Request Buffer Overflow
CAN-2000-0896 Fragmented IP packet attack


Credits:

This vulnerability was discovered and researched by Steven Maks
and Keith Jarvis of ISS. Internet Security Systems would like
to thank WatchGuard Technologies Inc. for their response and
handling of these vulnerabilities.

_____


About Internet Security Systems (ISS)

Internet Security Systems, Inc. (ISS) (NASDAQ: ISSX) is the leading
global provider of security management solutions for the Internet. By
combining best of breed products, security management services,
aggressive research and development, and comprehensive educational and
consulting services, ISS is the trusted security advisor for thousands
of organizations around the world looking to protect their mission
critical information and networks.

Copyright (c) 2000 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert
electronically. It is not to be edited in any way without express
consent of the X-Force. If you wish to reprint the whole or any part
of this Alert in any other medium excluding electronic medium, please
e-mail xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of
this information constitutes acceptance for use in an AS IS condition.
There are NO warranties with regard to this information. In no event
shall the author be liable for any damages whatsoever arising out of or in
connection with the use or spread of this information. Any use of this
information is at the user's own risk.

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as
well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force
xforce@iss.net of Internet Security Systems, Inc.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBOjj2pTRfJiV99eG9AQG/3QQAqBCd1MaYL9GPK+ua+FB6p+bV0rBCGJ0G
NzQsR2/wF4rw3eATM6CGN6uOUOzDKZOFtFvRxtsrHd08j+aPRHuIKJCAr6oJwbaH
I4l+Xf+22RmpkSzKjGc/RDbH8lR+uqW4JlBowD22hP+BMjxG8tB4RuaIR7wz/bH7
q+ZFxiceCsM=
=vK9U
-----END PGP SIGNATURE-----




Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close