Previous Thread
Next Thread
Print Thread
Rate Thread
Joined: Apr 2004
Posts: 298
Phatal Offline OP
UGN News Staff
OP Offline
UGN News Staff
Joined: Apr 2004
Posts: 298
A SECUNIA BULLETIN warns of a number of "extremely critical" holes in Symantec firewalls which could lead to denial of service attacks and system access.
Secunia said eEye reported multiple vulnerabilities in Symantec products including Norton Internet Security 2003/2002, AntiSpam 2004, Symantec Client FIrewall and Personal Firewall, and Symantec Client Security.

These could let a hacker into your system or compromise a vulnerable system, Secunia says.

However, there are patches available through the LiveUpdate feature and technical support channels, says Secunia.

Its advisory is here:: http://secunia.com/advisories/11066/

You can view the original article here...
http://www.snpx.com/cgi-bin/news5.cgi?target=.../cgi/NGoto/58636299?-2622

Joined: Apr 2004
Posts: 298
Phatal Offline OP
UGN News Staff
OP Offline
UGN News Staff
Joined: Apr 2004
Posts: 298
The SYMDNS.SYS driver included in the Symantec firewall product line validates DNS and NetBIOS Name Service responses before allowing them through the firewall. As it turns out, the handlers for both types of packets have grave security issues, but this advisory focuses on NBNS packets and leaves DNS up to Barns and Karl. The intended protocol is determined by the source port of the UDP packet -- 53 for DNS, 137 for NBNS -- and after verifying that the incoming packet is marked as a response according to the header, it is passed off to the appropriate analysis routine, both of which perform similar but protocol-specific processing on the answer data contained therein (although no further validation takes place).

In the case of the NBNS routine, the questions in the packet are skipped, and the answers are only examined if they have Class 01h (INET) and Type 01h (A) or 20h (NB). For answers meeting these criteria, the name is first-level decoded, the IP addresses are stored in a list, and both are later recorded internally in a global array. (As a refresher: first level encoding represents each byte of a name as two letters from 'A' to 'P', which correspond to the high and low hexadecimal digits of the byte's value -- 'A' is 0, 'B' is 1, 'C' is 2, and so on. For example, "eEye" is represented in hexadecimal as 65h 45h 79h 65h, and is therefore encoded as "GFEFHJGF". See RFC 1001, Section 14.1, for more information.)

The first of many problems that make this vulnerability possible is that the first-level decoding routine will decode an amount of data corresponding to the length byte preceding the encoded name, making it possible to store up to 127 arbitrary bytes (plus a null terminator) into a 32-byte stack buffer provided by the main NBNS processing routine. Although this condition is insufficient to overwrite the return address directly (the buffer begins at EBP-118h, but only an 80h-byte write is possible), there is an index variable that can be overwritten in order to manipulate the IP address copying loop later in the function. The NBNS processing routine's stack frame can be represented as follows:

PBYTE var_11C;
char var_118[0x20];
DWORD var_F8;
DWORD var_F4;
DWORD var_F0;
PBYTE var_EC;
DWORD var_E8[0x18];
char var_88[0x80];
PBYTE var_8;
PBYTE var_4;
(saved EBP at EBP+0)
(saved EIP at EBP+4)
...

var_118 is the destination buffer passed to the first-level decode routine, and just about everything after it is initialized after the decoding overwrite occurs, or is otherwise useless: var_E8/var_88 is memset to 0; var_EC and var_F0 get wiped out; var_F4 is just an outer loop counter (infinite loop: DoS); and var_8 and var_4 aren't even reachable. The exception here is var_F8, which is initialized to 0 at the beginning of the function, used to index into a stack array (var_E8), and is not checked for any out-of-bounds values other than the exact size of the array in elements (18h). The fact that the variable is located immediately after the overflowable buffer just adds to the convenience.

Once the answer name has been decoded, the NBNS processing routine enters another loop to copy IP addresses from the response into var_E8. Since the contents of the list are supposed to be accumulated from across all answers in the packet, var_F8 is not reinitialized when the loop begins, and furthermore, the terminating condition of the loop is only that var_F8 equals 18h (no greater-than). As a result, once the variable has been overwritten with a sufficiently high value, "IP addresses" within the packet will be written onto the stack at [EBP-E8h+(var_F8*4)] until the answer's data length has been exhausted (up to roughly 64KB).

Because the length of the first-level encoded name must be at least 40h in order to touch var_F8, the routine that skips a length-prefixed name component will mistake the length byte for a compressed name pointer, and will only advance by two bytes instead of (length of name + 1). This means the data that normally follows the encoded name actually begins "inside" the name, but this doesn't matter because the first-level decoding routine does not validate that the name consists only of characters from 'A' to 'P'. Additionally, it does not check for compressed name pointers and will happily accept any value for the length byte. The result of this stack buffer overflow / consistent lack of validation combo is another UDP remote kernel vulnerability.

Joined: Apr 2004
Posts: 298
Phatal Offline OP
UGN News Staff
OP Offline
UGN News Staff
Joined: Apr 2004
Posts: 298
You can read the rest of these advisories here...

http://eeye.com/html/Research/Advisories/index.html


Link Copied to Clipboard
Member Spotlight
Posts: 35
Joined: August 2003
Forum Statistics
Forums41
Topics33,840
Posts68,858
Average Daily Posts0
Members2,176
Most Online3,253
Jan 13th, 2020
Latest Postings
Where and how do you torrent?
by danni75 - 03/01/24 05:58 AM
Animation,
by JohanKaariainen - 08/15/19 01:18 AM
Blackbeard.....
by Gremelin - 10/03/18 07:02 PM
my old account still exists!
by Crime - 08/10/18 02:47 PM
Okay WTF?
by HenryMiring - 09/27/17 01:45 AM
The History Thread...
by Gremelin - 08/11/17 12:11 PM
My friend NEEDS your HELP!
by Lena01 - 07/21/17 12:06 AM
I'm having fun with this guy.
by gabithompson730 - 07/20/17 01:50 AM
I want to upgrade my phone
by gabithompson730 - 07/20/17 01:49 AM
Doom 3
by Cyrez - 09/11/14 08:58 PM
Amazon Gift Card Generator/KeyGen?te
by Gecko666 - 08/22/14 09:21 AM
AIM scene 99-03
by lavos - 09/02/13 08:06 AM
Planetside 2
by Crime - 03/04/13 07:10 AM
Beta Testers Wanted
by Crime - 03/04/13 06:55 AM
Hello Everyone
by Gremelin - 02/12/12 06:01 PM
Tracfone ESN Generator
by Zanvin Green - 01/18/12 01:31 PM
Python 3 issue
by Testing - 12/17/11 09:28 PM
tracfone airtime
by Drache86 - 07/30/11 03:37 AM
Backdoors and the Infinite
by ZeroCoolStar - 07/10/11 03:52 AM
HackThisZIne #12 Releaseed!
by Pipat2 - 04/28/11 09:20 PM
gang wars? l33t-wars?
by Gremelin - 04/28/11 05:56 AM
Consolidate Forums
by diggin2deep - 04/21/11 10:02 AM
LAN Hacking Noob
by Gremelin - 03/12/11 12:42 AM
Top Posters
UGN Security 41,392
Gremelin 7,203
§intå× 3,255
SilentRage 1,273
Ice 1,146
pergesu 1,136
Infinite 1,041
jonconley 955
Girlie 908
unreal 860
Top Likes Received
Ghost 2
Crime 1
Ice 1
Dartur 1
Cyrez 1
Powered by UBB.threads™ PHP Forum Software 7.7.5