exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

sygate.spoof.txt

sygate.spoof.txt
Posted Sep 17, 2002
Authored by Abraham Lincoln Hao | Site nssolution.com

NSSI-Research Labs Security Advisory NSSI-2002-sygatepfw5 - The Sygate Personal Firewall v5.0 does not log or block packets with a source address set to 127.0.0.1, allowing denial of service and other attacks. Tested under Win2k Advance Server with SP3 / WinNT 4.0 with SP6a / Win2K Professional.

tags | denial of service
systems | windows
SHA-256 | 2040a3cfff094c044ece3e6a71854d2ed823fb4444b7f1e1eee639ea57f4aad4

sygate.spoof.txt

Change Mirror Download
NSSI-Research Labs Security Advisory

http://www.nssolution.com (Philippines / .ph)
"Maximum e-security"

http://nssilabs.nssolution.com

Sygate Personal Firewall 5.0 IP Spoofing Vulnerability

Author: Abraham Lincoln Hao / SunNinja

e-Mail: abraham@nssolution.com / SunNinja@Scientist.com

Advisory Code: NSSI-2002-sygatepfw5

Tested: Under Win2k Advance Server with SP3 / WinNT 4.0 with SP6a / Win2K Professional

Vendor Status: Vendor already accepted the vulnerability and they will be releasing new version to Patch the vulnerability

Vendors website: http://www.sygate.Com
Severity: High

Overview:
Sygate Personal Firewall 5.0 is a host-based Firewall designed to protect your PC against attacks from both the Internet, and other computers in the local network.

Sygate Personal Firewall 5.0 for windows platform contains IP Spoofing vulnerability. These vulnerability could allow an attacker with a source IP of 127.0.0.1 to Attack the host protected by Sygate Personal firewall without being detected. Sygate Personal firewall is having problem detecting incoming traffic with source ip 127.0.0.1 (loopback address)
Details:

Test diagram:
[*Nix b0x with IP Spoofing scanner / Flooder] <===[10/100mbps switch===> [Host with SPF] 
 1] IP Spoofing Vulnerability Default Installation

- SPF is vulnerable with IP Spoofing attack by Scanning the host with a source ip address 127.0.0.1 or network address 127.0.0.0. The Attacker could scan or attack the target host without being detected by the personal firewall. This vulnerability is very serious w/c an attacker could start a Denial of Service attack against the spf protected host and launch any form of attack.
- To those who wants to try to simulate the vulnerability, you may use source address 127.0.0.1 - 127.0.0.255 ;)

Workaround:

1] Set the SPF to BLOCK ALL mode setting which i don't think the user would do ;) This type of setting would block everything all incoming request and outgoing.

2] Block source address 127.0.0.1 or 127.0.0.0 network address manually in Advance rules section.

Any Questions? Suggestions? or Comments? let us know. (Free your mind)

e-mail: nssilabs@nssolution.com / abraham@nssolution.com / infosec@nssolution.com

greetings:
nssilabs team bring the heat! ;) Lawless the saint ;), dig0, b45h3r, jethro, mr. d.f.a, p1x3lb0y, rj45-gu1t4rgawd and to our webmaster raymund (R2/D2)



--
__________________________________________________________
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close