Just a quick heads-up:

MS02-027 cites blocking port 70 as an effective protection against
exploitation of the Gopher buffer overrun in IE / ISA server / MS proxy:

"Most notably, customers who block access to the Gopher protocol (TCP 
 port 70) at the perimeter firewall would be protected against attempts 
 to exploit this vulnerability across the Internet."


This is untrue. Gopher servers can run on any port, e.g.
"gopher://evilhacker.net:1234";, or why not ":80", so don't trust 
blocking port 70 at all. Use the other workarounds instead.

(In fact, in the case of *nix servers, it's even easier for an attacker 
to run the fake gopher server on a high port; this way, he won't even 
need root priviliges.)


Take care,
/Mikael Olsson

-- 
Mikael Olsson, Clavister AB
Storgatan 12, Box 393, SE-891 28 �RNSK�LDSVIK, Sweden
Phone: +46 (0)660 29 92 00   Mobile: +46 (0)70 26 222 05
Fax: +46 (0)660 122 50       WWW: http://www.clavister.com

Reply via email to