what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

snapgear.dos.txt

snapgear.dos.txt
Posted May 5, 2002
Authored by Peter Grundl, Andreas Sandor

Several issues with the Snapgear Lite+ Firewall v1.5.3 and 1.5.4 allows malicious users to cause a Denial of Service situation, where part of or all of the Firewall would cease to function.

tags | denial of service
SHA-256 | ea5aadf5bae1bc169cd38590efe537ef0df81deca563defaf5c777f035e00c64

snapgear.dos.txt

Change Mirror Download
--------------------------------------------------------------------

Title: Snapgear Lite+ Firewall Denial of Service

BUG-ID: 2002017
Released: 02nd May 2002
--------------------------------------------------------------------

Problem:
========
Several issues with the Snapgear Lite+ Firewall could allow a
malicious user to cause a Denial of Service situation, where part
of or all of the Firewall would cease to function.


Vulnerable:
===========
- Snapgear Lite+ V1.5.3 (all issues)
- Snapgear Lite+ V1.5.4 (some issues)


Not vulnerable:
===============
- Snapgear Lite+ V1.6.0


Product Description:
====================
Quoted from the vendors webpage:

"The SnapGear LITE+ is an ethernet/broadband VPN router, with one
10/100BaseT WAN port, one 4-port 10/100BaseT switch on the LAN,
and one serial port that can have a modem attached for narrowband
fallback to dial-out."


Details:
========
There are four general areas in which we found problems with the
way the Snapgear Firewall handled malicious traffic:

HTTP)
If external web management had been enabled, creating 50 connections
to the web port and cycling through them would result in the
firewall crashing. In V1.5.4 this would only result in web management
crashing.

PPTP)
If PPTP had been enabled, creating 50 connections to the PPTP port and
cycling through them would result in the firewall crashing.

IPSEC)
Sending a 0 length UDP packet to UDP port 500 would result in IPSEC
exiting. This would result in IPSEC no longer working. This issue was
resolved in v1.5.4.

IP-OPTIONS)
Sending a stream of approx. 7000 packets with malformed IP options
through the firewall would result in the firewall crashing. This
stream could be sent from the internal network or externally.


Vendor URL:
===========
You can visit the vendors webpage here: https://www.snapgear.com


Vendor response:
================
The vendor was contacted about the first issue on the 14th of
February, 2002 and subsequently on the 7th of March, 2002 about
the remainding issues. On the 10th of April, 2002 we received a
beta version of v1.6.0, which corrected the issues. On the 2nd
of May, 2002 we received notification that V1.6.0 had been
released.


Corrective action:
==================
Install firmware version 1.6.0, which is available here:
https://www.snapgear.com/downloads.html


Authors:
Andreas Sandor (asandor@kpmg.dk) & Peter Gründl (pgrundl@kpmg.dk)

--------------------------------------------------------------------
KPMG is not responsible for the misuse of the information we provide
through our security advisories. These advisories are a service to
the professional security community. In no event shall KPMG be lia-
ble for any consequences whatsoever arising out of or in connection
with the use or spread of this information.
--------------------------------------------------------------------

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    26 Files
  • 27
    Sep 27th
    39 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    24 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close