what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

blackice.3.1.txt

blackice.3.1.txt
Posted Jun 10, 2002
Site kpmg.dk

The BlackICE Agent v3.1 for Windows 2000 laptop can be bypassed. Fix available here.

systems | windows
SHA-256 | 29b2801570bed5f11b3e08f1b8cf265e4a34f19dc275214fdca91d363501156f

blackice.3.1.txt

Change Mirror Download
--------------------------------------------------------------------

Title: BlackICE Agent not Firewalling After Standby

BUG-ID: 2002019
Released: 06th Jun 2002
--------------------------------------------------------------------

Problem:
========
In a default installation, The BlackICE Agent might not reactivate
when the host returns from standby. This could allow a malicious
user to bypass the firewall completely.



Vulnerable:
===========
- BlackICE Agent 3.1 eal on Windows 2000 laptop

Not Vulnerable:
===============
- BlackICE Agent 3.1 ebh on Windows 2000 laptop


Details:
========
The BlackICE Agent setup contains the parameter
"restart.whenSuspend", which should be enabled by default. This,
however, is not always the case, and as a result the firewall
might not reactivate after a system standby. The BlackICE Agent
would still give all the appearences of being active, but the
filter function would not be in effect, and network communication
would be possible to the same extent as if the software wasn't
installed.


Vendor URL:
===========
You can visit the vendor webpage here: http://www.iss.net


Vendor response:
================
The vendor was notified on the 15th of March, 2002. The issue was
assigned case number 526997. On the 18th of March, we received a
workaround that seemingly solved the issue. On the 6th of June, 2002
the vendor informed us that the issue had been corrected in the
latest build.


Corrective action:
==================
Upgrade to BlackICE Agent V3.1 EBH, available through:
https://bvlive01.iss.net/issEn/DLC/login.jhtml



Author: Andreas Sandor (asandor@kpmg.dk)

--------------------------------------------------------------------
KPMG is not responsible for the misuse of the information we provide
through our security advisories. These advisories are a service to
the professional security community. In no event shall KPMG be lia-
ble for any consequences whatsoever arising out of or in connection
with the use or spread of this information.
--------------------------------------------------------------------

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close