Security Incidents mailing list archives

Re: Source port 445,80


From: Valdis.Kletnieks () vt edu
Date: Thu, 06 Sep 2007 12:55:49 -0400

On Thu, 06 Sep 2007 12:17:47 +0800, Wong Yu Liang said:
Thanks valdis=20
 I suspected so. Possibly a worm propagation and the ips detected the
*return* traffic. But yet the alerts from my ips is very strange. Some
alerts

172.16.1.254:80 -> 172.17.17.103:1434 MSSQL buffer overflow detected
172.16.1.254:80 -> 172.17.17.16:1434 MSSQL buffer overflow detected
And the list goes on to different destination IP addres

OK, that's a *different* well-known pattern - as mssql in fact lives on 1434.

What the attacker is doing is using a hand-set source port of 80, to get through
those older firewalls that don't do stateful connection tracking.

Newer firewalls will watch the traffic, and if they see a TCP SYN packet going
*out* to a given port/IP pair, will automagically whitelist the return path,
so the SYN/ACK packet makes it back, but traffic from *other* sites still
won't be able to enter inbound.

Older non-stateful firewalls would simply be configured with two rules:
allow outbound to port 80
allow inbound from port 80
so you could talk to webservers.  So some hacking tools abuse the existence
of such rules to improve their chances of getting in through the firewall...

Incidentally, this sort of thing is hard to troubleshoot when both addresses
are in the 172.16/12 address block, that's an RFC1918 reserved space.  So
either the source is inside your own network, or you need to go look at whatever
is doing your NAT at the border and get it to cough up the *real* IP address
of the source....

Attachment: _bin
Description:


Current thread: