You'd  really need to put a packet filter behind your firewall;
I've done it all the time and I'm not particularly worried about
the RDP bug/feature/hole.  The packet filter acts as a failsafe
for your firewall.

You can use a router or, in my case, a Linux IPChains box.

> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Joel
> Turoff
> Sent: Tuesday, July 10, 2001 8:46 PM
> To: '[EMAIL PROTECTED]'
> Subject: [FW1] CERT Advisory and SecuRemote
>
>
>
> Hey folks:
>
> According to the recent security advisory, if you have the default "Accept
> Firewall-1" implied rule checked, someone can bypass the firewall with
> faked RDP packets.
>
> My question is this.  If you don't have the implied rule, and you're using
> SecuRemote with IKE encryption, you need a rule in your rulebase that
> accepts RDP/UPD packets destined for the firewall itself from *any* source
> This is necessary for the IKE handshake that starts the encryption process
> in a SecuRemote session, and the source IP address has to be "any" because
> you never know where your VPN clients are coming from.  So are we still
> susceptible to faked RDP packets as described in the security alert if we
> run a firewall with this rule?
>
> Joel
>
>
>
>
>
> At 07:34 PM 7/9/01 -0500, Oscar Aviles wrote:
> >
> >
> >
> >       Look that friends....
> >
> >
> >
> >
> >
> >-----BEGIN PGP SIGNED MESSAGE-----
> >
> >CERT Advisory CA-2001-17 Check Point RDP Bypass Vulnerability
> >
> >   Original release date: July 09, 2001
> >   Last revised: --
> >   Source: CERT/CC
> >
> >   A complete revision history is at the end of this file.
> >
> >Systems Affected
> >
> >     * Check Point VPN-1 and FireWall-1 Version 4.1
> >
> >Overview
> >
> >   A vulnerability in Check Point FireWall-1 and VPN-1 may allow an
> >   intruder to pass traffic through the firewall on port 259/UDP.
> >
> >I. Description
> >
> >   Inside Security GmbH has discovered a vulnerability in Check Point
> >   FireWall-1 and VPN-1 that allows an intruder to bypass the firewall.
> >   The default FireWall-1 management rules allow arbitrary RDP (Reliable
> >   Data Protocol) connections to traverse the firewall. RFC-908 and
> >   RFC-1151 describe the Reliable Data Protocol (RDP). Quoting from
> >   RFC-908:
> >
> >     The Reliable Data Protocol (RDP) is designed to provide a reliable
> >     data transport service for packet-based applications such as remote
> >     loading and debugging.
> >
> >   RDP was designed to have much of the same functionality as TCP, but it
> >   has some advantages over TCP in certain situations. FireWall-1 and
> >   VPN-1 include support for RDP, but they do not provide adequate
> >   security controls. Quoting from the advisory provided by Inside
> >   Security GmbH:
> >
> >     By adding a faked RDP header to normal UDP traffic any content can
> >     be passed to port 259 on any remote host on either side of the
> >     firewall.
> >
> >   For more information, see the Inside Security GmbH security advisory,
> >   available at
> >
> >          http://www.inside-security.de/advisories/fw1_rdp.html
> >
> >   Although the CERT/CC has not seen any incident activity related to
> >   this vulnerability, we do recommend that all affected sites upgrade
> >   their Check Point software as soon as possible.
> >
> >II. Impact
> >
> >   An intruder can pass UDP traffic with arbitrary content through the
> >   firewall on port 259 in violation of implied security policies.
> >
> >   If an intruder can gain control of a host inside the firewall, he may
> >   be able to use this vulnerability to tunnel arbitrary traffic across
> >   the firewall boundary.
> >
> >   Additionally, even if an intruder does not have control of a host
> >   inside the firewall, he may be able to use this vulnerability as a
> >   means of exploiting another vulnerability in software listening
> >   passively on the internal network.
> >
> >   Finally, an intruder may be able to use this vulnerability to launch
> >   certain kinds of denial-of-service attacks.
> >
> >III. Solutions
> >
> >   Install a patch from Check Point Software Technologies. More
> >   information is available in Appendix A.
> >
> >   Until a patch can be applied, you may be able to reduce your exposure
> >   to this vulnerability by configuring your router to block access to
> >   259/UDP at your network perimeter.
> >
> >Appendix A
> >
> >Check Point
> >
> >   Check Point has issued an alert for this vulnerability at
> >
> >          http://www.checkpoint.com/techsupport/alerts/
> >
> >   Download the patch from Check Point's web site:
> >
> >          http://www.checkpoint.com/techsupport/downloads.html
> >
> >Appendix B. - References
> >
> >    1. http://www.inside-security.de/advisories/fw1_rdp.html
> >    2. http://www.kb.cert.org/vuls/id/310295
> >    3. http://www.ietf.org/rfc/rfc908.txt
> >    4. http://www.ietf.org/rfc/rfc1151.txt
> >     _________________________________________________________________
> >
> >   Our thanks to Inside Security GmbH for the information contained in
> >   their advisory.
> >     _________________________________________________________________
> >
> >   This document was written by Ian A. Finlay. If you have feedback
> >   concerning this document, please send email to:
> >
> >          mailto:[EMAIL PROTECTED]?Subject=Feedback CA-2001-17 [VU#310295]
> >
> >   Copyright 2001 Carnegie Mellon University.
> >
> >   Revision History
> >July 09, 2001: Initial Release
> >
> >-----BEGIN PGP SIGNATURE-----
> >Version: PGPfreeware 5.0i for non-commercial use
> >Charset: noconv
> >
> >iQCVAwUBO0njBQYcfu8gsZJZAQHOCAP+L8JEWTsWqvWjZQaVpHPb6GHn7D837lzc
> >rE/ef50+6xSzRZyBPXQ8+3N6JqYk8PBufYCcqtiqL1PfNJw3YfrGJ5irzS4ENXTg
> >mupUNTfdG0UhEAOWJbsjykfB0K/PPaeFrtf1jod1zd9uKPIFytHLAzMHWzUwTTtW
> >4qSlIxoiHEQ=
> >=v8vs
> >-----END PGP SIGNATURE-----
> >
> >
> >
> >
> >
> >=================================================================
> ==========
> =====
> >     To unsubscribe from this mailing list, please see the
> instructions at
> >               http://www.checkpoint.com/services/mailing.html
> >=================================================================
> ==========
> =====
> >
> >
> >
>
>
> ==================================================================
> ==============
>      To unsubscribe from this mailing list, please see the instructions at
>                http://www.checkpoint.com/services/mailing.html
> ==================================================================
> ==============
>



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to