exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

watchguard.dos.txt

watchguard.dos.txt
Posted Apr 9, 2002
Authored by Andreas Sandor

Watchguard SOHO remote denial of service vulnerability - All versions prior to v5.0.35 crash when tcp traffic with bad IP options are sent. The Watchguard Soho firewall does not perform parsing of IP options unless the packet has to be forwarded. This means that most home users will not be affected by this vulnerability, unless they have a service running behind the firewall, that is enabled through port- forwarding (eg. FTP, HTTP).

tags | remote, web, denial of service, tcp
SHA-256 | d4e57f6e99405813301b492710370b3c468cb976efffd0630b0f2a18edb29d82

watchguard.dos.txt

Change Mirror Download
--------------------------------------------------------------------
-=>Watchguard SOHO Denial of Service<=-
Brought to you by KPMG Denmark
BUG-ID: 2002007 Released: 08th apr, 2002
--------------------------------------------------------------------
Problem:
========
Sending TCP traffic with bad IP options through the firewall makes it
crash and reboot.


Vulnerable:
===========
- All versions prior to 5.0.35

Details:
========
When the Watchguard Soho firewall attempts to parse packets with
certain malformed IP options, it will cause the firewall to crash
and reboot. This will effectively drop the current connections,
including the ones established through built-in VPN.

The Watchguard Soho firewall does not perform parsing of IP options
unless the packet has to be forwarded. This means that most home
users will not be affected by this vulnerability, unless they have
a service running behind the firewall, that is enabled through port-
forwarding (eg. FTP, HTTP).


Vendor URL:
===========
You can visit the vendors webpage here: http://www.watchguard.com

Vendor response:
================
The vendor was contacted on the 20th of March, 2002 regarding this
issue and a fix was announced on the 6th of April, 2002.

Corrective action:
==================
Install the latest firmware, 5.0.35 to correct the problem.

Author: Andreas Sandor (asandor@kpmg.dk)
--------------------------------------------------------------------
KPMG is not responsible for the misuse of the information we provide
through our security advisories. These advisories are a service to
the professional security community. In no event shall KPMG be lia-
ble for any consequences whatsoever arising out of or in connection
with the use or spread of this information.
--------------------------------------------------------------------

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close