what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Fortinet Bypass And Evasion

Fortinet Bypass And Evasion
Posted Apr 17, 2009
Authored by Thierry Zoller

The parsing engine in Fortinet can be bypassed by a specially crafted and formated archive file. The bug results in denying the engine the possibility to inspect code within the archive. There is no inspection of the content at all.

tags | advisory
SHA-256 | 7330e5a1ce82e9df459efa7a72231861338a5a8b8faa3988279a52bfc3e70f47

Fortinet Bypass And Evasion

Change Mirror Download
______________________________________________________________________

From the low-hanging-fruit-department - Fortinet bypass/evasion
______________________________________________________________________

Release mode: Forced release, vendor has not replied.
Ref : TZO-112009 - Fortinet Generic Evasion
WWW : http://blog.zoller.lu/2005/04/fortinet-evasion-bypass-limited-details.html
Vendor : http://www.fortinet.com
Security notification reaction rating : Catastrophic

Disclosure Policy :
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products :
- t.b.a (Vendor has not reacted, please see below)

As this bug has not been reproduced by the vendor, this limited advisory
relies on the assumption that my tests were conclusive and that the test
environment mimics the production environment.

I. Background
~~~~~~~~~~~~~
Quote: "Fortinet is a leading provider of network security appliances and the
leader of the unified threat management (UTM) market worldwide.
Fortinet's award-winning portfolio of security gateways,
subscription services, and complementary products delivers
the highest level of network, content, and application
security for enterprises of all sizes, managed service providers,
and telecommunications carriers, while reducing total cost of
ownership and providing a flexible, scalable path for expansion. "


II. Description
~~~~~~~~~~~~~~~
The parsing engine can be bypassed by a specially crafted and formated
archive file. Details are currently witheld due to other vendors that are
in process of deploying patches.

A professional reaction to a vulnerability notification is a way to
measure the maturity of a vendor in terms of security. Fortinet is given
a grace period of two (2) weeks to reply to my notification. Failure
to do so will result in POC being released in two (2) weeks.

Fortinet (aswell as others) is advised to leave a specific security contact
at [1] in order to simplify getting in contact with them.

As this bug has not been reproduced by the vendor, this limited advisory
relies on the assumption that my tests were conclusive.

III. Impact
~~~~~~~~~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at :
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the archive. There is no inspection of the content
at all.


IV. Disclosure timeline
~~~~~~~~~~~~~~~~~~~~~~~~~
09/03/2009 : Send proof of concept, description the terms under which
I cooperate and the planned disclosure date. There is
no security adress listed at [1] and hence took the industry
tandard security contacts addresses secure@ and security@.

No reply.

14/03/2009 : Resending specifying this is the last attempt to disclose
reponsibly.

No reply.

15/04/2009 : Fortinet published advisories for third party vendors with
the adress dontreply-secresearch@fortinet.com, used secresearch@fortinet.com
to resend advirory.

No reply.

17/04/2009 : Last attempt to contact, information sent to info@foritnet.com

no reply, as of time of publishing

17/04/2009 : Release of this advisory and begin of grace period.


[1] http://osvdb.org/vendor/1/Fortinet%20Inc_

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close