Actually by reading his original posts you can see that he doesn't want to have to log in to the FW1 to get internet access (probably porn surfing).
Anyway, the Checkpoint advisory is alarming in that I never though of checking for RDP holes since I've never used the protocol. Has anyone ever used the RDP and/or know of any other RDP vulnerabilities?
Mike
-----Original Message-----
From: Eric Johnson [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, July 11, 2001 4:22 AM
To: [EMAIL PROTECTED]
Subject: RE: Hacking FW-1 programs
At 03:09 PM 7/10/2001 -0400, Cessna, Michael wrote:
>Why would you post a request like this when all of us here are the ones
>maintaining Firewall of various manufacturers and it is our jobs to keep
>people from circumventing the security policies in place? I would be
>surprised to find that anyone here who is actually in the Security field
>would answer your post. This list is for security professionals or those
>interested in security (specifically firewalls) and not for people who
>would like to get around them, even for non-nefarious purposes. S security
>policy is only as good as it's enforcement. Which means no exceptions for
>anyone!
>
>BTW. Why don't you want to send your username and password? If you are not
>doing anything wrong then tracking what you do means nothing?
There was a CERT Advisory on July 9 about regarding Firewall-1.
Maybe this is why he asked.
--------------------------------------------------------------------------------
CERT Advisory CA-2001-17 Check Point RDP Bypass Vulnerability
Original release date: July 09, 2001
Last revised: --
Source: CERT/CC
A complete revision history is at the end of this file.
Systems Affected
* Check Point VPN-1 and FireWall-1 Version 4.1
Overview
A vulnerability in Check Point FireWall-1 and VPN-1 may allow an
intruder to pass traffic through the firewall on port 259/UDP.
I. Description
Inside Security GmbH has discovered a vulnerability in Check Point
FireWall-1 and VPN-1 that allows an intruder to bypass the firewall.
The default FireWall-1 management rules allow arbitrary RDP (Reliable
Data Protocol) connections to traverse the firewall. RFC-908 and
RFC-1151 describe the Reliable Data Protocol (RDP). Quoting from
RFC-908:
The Reliable Data Protocol (RDP) is designed to provide a reliable
data transport service for packet-based applications such as remote
loading and debugging.
RDP was designed to have much of the same functionality as TCP, but it
has some advantages over TCP in certain situations. FireWall-1 and
VPN-1 include support for RDP, but they do not provide adequate
security controls. Quoting from the advisory provided by Inside
Security GmbH:
By adding a faked RDP header to normal UDP traffic any content can
be passed to port 259 on any remote host on either side of the
firewall.
For more information, see the Inside Security GmbH security advisory,
available at
http://www.inside-security.de/advisories/fw1_rdp.html
Although the CERT/CC has not seen any incident activity related to
this vulnerability, we do recommend that all affected sites upgrade
their Check Point software as soon as possible.
II. Impact
An intruder can pass UDP traffic with arbitrary content through the
firewall on port 259 in violation of implied security policies.
If an intruder can gain control of a host inside the firewall, he may
be able to use this vulnerability to tunnel arbitrary traffic across
the firewall boundary.
Additionally, even if an intruder does not have control of a host
inside the firewall, he may be able to use this vulnerability as a
means of exploiting another vulnerability in software listening
passively on the internal network.
Finally, an intruder may be able to use this vulnerability to launch
certain kinds of denial-of-service attacks.
...
-------------------------------------------------------------------------------
Eric Johnson
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
