The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Vista Windows Firewall Incorrectly Applies Filtering to Teredo Interface


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 11 Jul 2007 12:06:17 +0200
Subject: [NT] Vista Windows Firewall Incorrectly Applies Filtering to Teredo Interface
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070711092826.1CFE05903@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Vista Windows Firewall Incorrectly Applies Filtering to Teredo Interface
------------------------------------------------------------------------


SUMMARY

Windows Firewall for Windows Vista is "the Microsoft provided firewall 
solution. It is installed and enabled out-of-the-box, with most ports 
filtered".

Due to an implementation issue, the Windows Firewall does not apply 
firewall rules correctly on the Teredo Interface. This allows a level of 
remote access to TCP and UDP ports and services that exceeds what 
Microsoft expected and what an administrator would expect.

DETAILS

Teredo is an IPv4 to IPv6 transition mechanism for IPv6-capable hosts that 
are located behind an IPv4 NAT. It is installed and enabled out-of-the-box 
on Windows Vista. It provides end-to-end automatic tunneling through a NAT 
by tunneling IPv6 over IPv4 UDP packets. Once a Teredo interface becomes 
set up (in Teredo terminology: qualified), anyone on the Internet that 
knows the Teredo address can send it packets and possibly establish 
sessions. This capability persists until the Teredo interface becomes 
de-qualified for some reason; while in general Teredo works to keep an 
Teredo interface qualified, under some circumstances, Vista will shut down 
the interface after 60 minutes of inactivity.

By design, Windows Firewall is supposed to block all access to ports on 
the Teredo interface, except for cases where access-though-Teredo is 
specifically requested (through the "Edge Traversal" flag in the firewall 
rule being set). However, due to a logic bug, it does not apply this 
restriction. Instead, any port that is accessible on the local network is 
also accessible from any host on the Internet over the Teredo interface, 
even if the firewall rule specifies "remote address=local subnet".

The level of exposure depends on current firewall rule settings. An 
out-of-the-box Vista installation with a network profile set to "private" 
will expose the following port across the Teredo interface:

 * TCP port 5357 (Web Services for Devices)


An exposed service may reveal sensitive or useful information to an 
attacker. In combination with a vulnerability in the service it may also 
provide an avenue of attack. In addition, a service that was designed to 
only be accessible in trusted circumstances may simply not present an 
adequate security posture for general Internet access.

It is not considered difficult for a remote user to cause the Teredo 
interface to become qualified. Teredo can become qualified simply because 
Vista or some application wants to use IPv6 for whatever reason. The 
attacker would then just have to guess the Teredo address or learn it by 
some means and they would be able to access any open ports.

Teredo will also become qualified if the address of a peer represents a 
Teredo address (perhaps even if the peer has a native IPv6 Internet 
access). Thus an attacker can send a URL of this form 
"http://[2001:0:...]/..." through e-mail, IM, HTTP, etc, and if the URL is 
followed, the attacker will both know the Teredo address of the victim and 
will have had the victim become qualified. A HTTP redirect to such a URL 
would also work and may be more stealthy. Reportedly, Vista will not 
return AAAA records corresponding to Teredo addresses, so attackers Teredo 
address would have to be listed by address and not by hostname.

Vendor Response:
This has been patched in MS07-038.

Recommendation:
Apply the patch contained in MS07-038.

In addition you should consider whether Teredo poses an acceptable level 
of exposure to your network. If it provides too much exposure (e.g., due 
to bypassing network-based security controls), you should disable Teredo 
and block it on your network

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3038>; 
CVE-2007-3038


ADDITIONAL INFORMATION

The information has been provided by Jim Hoagland / Ollie Whitehouse.
The original article can be found at:  
<http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-005.txt>; http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-005.txt




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру