what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

VIGILANTE-2000005.txt

VIGILANTE-2000005.txt
Posted Aug 15, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Security Advisory - Watchguard Firebox Authentication dos vulnerability. Sending a malformed URL to tcp port 4100 causes Watchguard to shut down and require a reboot to restart. Fix available here.

tags | exploit, denial of service, tcp
SHA-256 | 14919ca4948fe3696698e353b783188ead84c819a08b964e581bbb6c4dfa3cc0

VIGILANTE-2000005.txt

Change Mirror Download
Watchguard Firebox Authentication DoS

Advisory Code: VIGILANTE-2000005

Release Date:
August 15, 2000

Systems Affected:
Tested on the newest version of the Watchguard Firebox II (that was on the
22nd of June), but it is very likely that this bug exists in all prior
versions that include the authentication service (TCP port 4100).

THE PROBLEM
Sending a malformed URL to the authentication service running on TCP port
4100, causes it to shut down and requires a reboot of the Watchguard for it
to work again.

Vendor Status:
Vendor was informed of the problem, and have been very cooperative in
getting a patch developed for the problem. According to the vendor the
problem is not caused by a buffer overflow.

Fix (quote from the vendor):
"all current WatchGuard LiveSecurity Subscribers have been
sent the Service Pack that addresses this issue. Copies of this
Service Pack can be downloaded from the WatchGuard LiveSecurity
Archive. To log into the archive, go to
http://www.watchguard.com/support. A work around that addresses the
vulnerability from the external interface is to disable Authentication
to the Firebox from the external interface. Upstream routers can also
be used to control access to this service if access to the
Authentication applet is required from the external interface and you
do not wish to install the patch. For obvious reasons, these are
sub-optimal solutions."

Vendor URL: http://www.watchguard.com
Product URL: http://www.watchguard.com/products/fIImss.asp

Copyright VIGILANTe 2000-08-15

Disclaimer:
The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.

Feedback:
Please send suggestions, updates, and comments to:

VIGILANTe
mailto: info@vigilante.com
http://www.vigilante.com

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close