what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

IRM Security Advisory 11

IRM Security Advisory 11
Posted Apr 18, 2005
Authored by IRM Research, IRM Advisories | Site irmplc.com

IRM Security Advisory 011 - Sygate Security Agent (Sygate Secure Enterprise) Denial of Service - A flaw in the policy management component allows malicious users to configure the firewall to use a nonexistent policy, thereby causing a Denial of Service condition.

tags | advisory, denial of service
SHA-256 | 72d952c4b7b042946ac30effd501092f3529e35e766c45c48cb4373b4981cc38

IRM Security Advisory 11

Change Mirror Download
IRM Security Advisory No. 011

Sygate Security Agent (Sygate Secure Enterprise) Denial of Service

Problem Discovered: January 24th 2005
Vendor contacted: March 8th 2005
Advisory published: April 11th 2005


Abstract
--------
Sygate Secure Enterprise includes a Security Agent (SSA) that runs on a
client system as one of its components alongside policy management and
enforcement servers inside a network.

The Sygate Agent incorporates a 'stateful' firewall, where it applies a
rule-based security policy and controls application usage. The agent
also has an intrusion prevention engine which can detect port scanning
and different types of known attacks. Additionally, it can verify the
security status of a client including the status of executables,
Anti-Virus, firewall, et al.

During a recent security assessment of a laptop build, IRM identified a
security issue associated with SSA. A non-privileged user is able to
export the security policy file and make a simple modification. The file
can then be imported back, which results in the agent 'failing open' on
next restart.

Description
-----------
The SSA security policy file is an XML file which could be exported by a
non-privileged user and then imported back. It is therefore possible to
change certain settings in the policy file including trusted IP
addresses, or DNS names for instance. Additionally, it is possible to
modify the name of the default policy location to a non-existing one.
When SSA is closed gracefully during system shutdown, the imported
policy is saved and also copied to the backup, resulting in both
policies having an inexistent 'DefaultLocation'. When SSA starts up
again, the policy is loaded and upon switching to the DefaultLocation it
throws an exception and fails.

Affected Versions
-----------------
SSA running in 'Server Control' or 'Power User' Modes:

* SSA version 3.5
* SSA version 4.0
* SSA version 4.1

Unaffected Versions
-------------------

* SSA in client mode (any version)
* Sygate Personal Firewall (Standard and Pro versions)

Vendor & Patch Information
--------------------------
Sygate were contacted and immediately started investigating the issue.
When the vulnerability was confirmed, a new build was released. Users
are required to upgrade to the latest builds for each version:

* SSA3.5 build 2580
* SSA4.0 build 2715
* SSA4.1 build 2827

These are available from Sygate's website (http://www.sygate.com).

Workarounds
-----------
Enable password protection for SSA export/import function (this is not
the default setting for SSA running in 'Server Control' or 'Power User'
Modes).

Credits
-------
Research & Advisory: Mazin Faour.

Disclaimer
----------
All information in this advisory is provided on an 'as is' basis in the
hope that it will be useful. Information Risk Management Plc is not
responsible for any risks or occurrences caused by the application of
this information.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close