The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Clavister Firewall Multiple Vulnerabilities (Multiple DoS, Password String Filtering)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 5 Jun 2005 19:01:17 +0200
Subject: [NEWS] Clavister Firewall Multiple Vulnerabilities (Multiple DoS, Password String Filtering)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050606062202.47908581D@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
X-Spam-Status: No, hits=2.03 tagged_above=2 required=5 tests=AWL,
 MILLION_EMAIL, MSGID_FROM_MTA_ID
X-Spam-Level: **

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Clavister Firewall Multiple Vulnerabilities (Multiple DoS, Password String 
Filtering)
------------------------------------------------------------------------


SUMMARY

"The products in the  <http://www.clavister.com/>; Clavister Security 
Gateway  Appliance series are turn-key solutions available in a variety of 
models to match variable scenarios. The models range from powerful 
carrier-class products to small units for remote office and branch office 
solutions."

The lack of IP range sanitation allows attackers to crash the Clavister 
Firewall. Further, lack of password strength verification mechanisms allow 
users to configure the Firewall to use weak passwords for authentication 
purposes.

DETAILS

Vulnerable Systems:
 * Clavister Gateway version 8.50 and prior
 * EnterNet FireWall version 6.01

Immune Systems:
 * Clavister Gateway version 8.50.01

Memory Exhaustion DoS:
An attacker can cause the Firewall to crash by configuring it to accept a 
large IP address pool for its L2TP (Layer 2 Tunneling Protocol) or PPTP 
(Point-to-Point Tunneling Protocol) support. This is due to the fact that 
the IP pool requires very large amounts of RAM, for example when such 
ranges as "0.0.0.0/0" or an entire class 'A' network (i.e. 16 million 
addresses) is provided to the Firewall.

Lack of Password Strength Verification Mechanisms:
Some special characters are not accepted by the Firewall when they are 
assigned to usernames, passwords, PKSs (pre-shared keys) and other 
user-specific credentials.

This in turn can cause weak passwords to be used as they user is not made 
aware that the special characters were not used in the final password used 
for authentication.

Disclosure Timeline:
03-06-2005 - Vulnerability researched
04-06-2005 - Security companies and several CERT units contacted - 
Additional detailed information sent to security companies and several 
CERT units


ADDITIONAL INFORMATION

The information has been provided by  <mailto:juha-matti.laurio@netti.fi.> 
Juha-Matti Laurio.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру