what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

nssi.tpfw.txt

nssi.tpfw.txt
Posted Aug 21, 2002
Authored by Aaron Tan Lu | Site nssolution.com

NSSI Research Labs Security Advisory NSSI-2002-tpfw - The Tiny Personal Firewall 3.0 for Windows contains contains denial of service vulnerabilities in the activity logger tab of the Personal Firewall Agent module which allow remote attackers to crash the OS, consuming 100% of the CPU.

tags | remote, denial of service, vulnerability
systems | windows
SHA-256 | 4369b0114c0361e90582dcab9a61d7e641248ac2189b78b4b81faabc72a906cd

nssi.tpfw.txt

Change Mirror Download
NSSI-Research Labs Security Advisory

http://www.nssolution.com (Ph)

"Maximum e-security"

http://nssilabs.nssolution.com

Tiny Personal Firewall 3.0 Denial of Service Vulnerabilities

Author: Aaron Tan Lu / b45h3r

e-Mail: aaron@nssolution.com / b45h3r@techie.com

Advisory Code: NSSI-2002-tpfw

Tested under Win2k Advance Server / WinNT 4.0

Vendor Status: No Response for 1 1/2 weeks after the notice. They just informed us that they already gave notice to their Development team

Vendors website: http://www.tinysoftware.com

Severity: High



Overview

Tiny Personal Firewall 3.0 is ideal for standalone computers or for trusted experienced users in corporate environment. It protects personal computers against network attacks, worms, trojans and viruses and manages the access of computer processes (programs) to computer resources (memory, files, devices). This was said on their web-site as it goes.

Tiny Personal Firewall 3.0 for windows platform contains Denial of Service vulnerabilities in its Personal Firewall Agent module specifically the activity logger tab. These vulnerabilities could allow an attacker to crash the operating system consuming 100% of your CPU resources.

Details

1] DoS vulnerability with Tiny Personal Firewall 3.0 Default Installation

- By simply portscanning the host with Tiny Personal Firewall 3.0 default install by sending multiple SYN, UDP, ICMP and TCP full Connect through all its ports and as the user browses its Personal Firewall Agent module firewall Log tab. The user can cause a crash to its own operating system by just clicking or viewing the Activity tab of the said module.

Note: With WinNT 4.0 with Sp6a workaround is not possible.

2] IP spoofing and DoS vulnerability

- It is quite similar to the first one but this vulnerability comes in with the fully configured Tiny Personal Firewall 3.0 and Setting up the personal firewall to HIGH Security. The Personal firewall is having problem blocking packets with Spoof source address <firewall's own IP address>.

Workaround:

1] Simply change the permission for the rules under System Applications on Inbound ICMP(LAN1) to ask user.

2] This vulnerability has no work around. Even if you block all the IP addresses, protocols and ports, the Firewall will fail to handle the attack.



Any Questions? Suggestions? or Comments? let us know

e-mail: nssilabs@nssolution.com / aaron@nssolution.com / support@nssolution.com

--
__________________________________________________________
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close