Bugtraq mailing list archives

Re: Multiple Symantec Firewall Secure Webserver timeout DoS


From: "Sym Security" <symsecurity () symantec com>
Date: Tue, 15 Oct 2002 09:27:47 -0500


October 13, 2002
Symantec Firewall Secure Webserver timeout DoS

Risk
Medium

Overview
Advanced IT-Security, a Scandinavian security consultancy, notified
Symantec of a denial-of-service (D0S) issue they had discovered with the
web proxy component in the Symantec Enterprise Firewall.  A malicious user
who is able to establish a remote connection to the proxy server could, by
requesting multiple connections to a non-existent or erroneous internal
URL, cause the proxy server to timeout for an extended period of time.
While timed out, the server fails to process any subsequent connection
requests.

Products/Versions
Raptor Firewall 6.5 (Windows NT)
Raptor Firewall V6.5.3 (Solaris)
Symantec Enterprise Firewall 6.5.2 (Windows 2000 and NT)
Symantec Enterprise Firewall V7.0 (Solaris)
Symantec Enterprise Firewall 7.0 (Windows 2000 and NT)
VelociRaptor Model 500/700/1000
VelociRaptor Model 1100/1200/1300
Symantec Gateway Security 5110/5200/5300


Symantec Response
Symantec tested and verified the problem discovered by Advanced
IT-Security.  This issue has been addressed in the security hotfix bundle
currently available for download through the Symantec Enterprise Support
site http://www.symantec.com/techsupp.

As a best practice, Symantec recommends keeping all operating systems and
applications updated with the latest vendor patches. Keeping
mission-critical systems updated with all security patches applied reduces
risk exposure.

Credit
Symantec takes the security and proper functionality of our products very
seriously.  Symantec appreciates the assistance of Tommy Mikalsen from
Advanced IT-Security in identifying this area of concern so we could
quickly address it. Anyone with information on security issues with
Symantec products should contact symsecurity () symantec com. The Sym Security
PGP key can be downloaded  from
http://securityresponse.symantec.com/avcenter/security/publickey/SymSecurity.asc
.

This advisory is available at
http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11.html

CVE
The Common Vulnerabilities and Exposures (CVE) initiative has assigned the
name  CAN-2002-0990 to the SEF HTTP_CONNECT Secure Webserver DoS.

This is a candidate for inclusion in the CVE list (http://cve.mitre.org),
which standardizes names for security problems.



Copyright (c) 2002 by Symantec Corp.
Permission to redistribute this alert electronically is granted as long as
it is not edited in any way unless authorized by Symantec Security
Response. Reprinting the whole or part of this alert in medium other than
electronically requires permission from symsecurity () symantec com.
Disclaimer
The information in the advisory is believed to be accurate at the time of
printing based on currently available information. Use of the information
constitutes acceptance for use in an AS IS condition. There are no
warranties with regard to this information. Neither the author nor the
publisher accepts any liability for any direct, indirect or consequential
loss or damage arising from use of, or reliance on this information.
Symantec, Symantec products, Symantec Security Response, and SymSecurity
are registered trademarks of Symantec Corp. and/or affiliated companies in
the United States and other countries. All other registered and
unregistered trademarks represented in this document are the sole property
of their respective companies/owners.

---------------------------------------------------------------------------------------------------------------

AI-SEC Security Advisories <advisories () ai-sec dk>

10/14/2002 02:06 PM
Please respond to advisories

Advanced IT-Security Advisory #01-10-2002

http://www.ai-sec.dk/

Issue:
======
Multiple Symantec Firewall Secure Webserver timeout DoS

Problemdescription:
===================
There exists a problem in "Simple, secure webserver 1.1" which is shipped
with numerous Symantec firewalls, in which an attacker can connect to the
proxyserver from the outside, and issue a HTTP-style
CONNECT to a domain with a missing, or flawed DNS-server. The "Simple,
secure webserver 1.1" appears to wait for a timeout contacting the DNS
server, and while doing so the software does not fork and
thereby queues or drops all requests coming from other clients. The timeout
usually last up to 300 seconds. Sending subsequent requests for other
hostnames in the same flawed domain will force the
Simple, secure webserver 1.1 to stop processing requests for a long time.

The exploit works regardless if the domainname in question is allowed or
not in the ACL.

-----------------------------snip-------------------------










Current thread: