Firewall advisory

Discussion in 'other firewalls' started by Chuck57, Jan 4, 2005.

Thread Status:
Not open for further replies.
  1. Chuck57

    Chuck57 Registered Member

    Joined:
    Sep 2, 2002
    Posts:
    1,770
    Location:
    New Mexico, USA
    I'm not sure if this is significant or not, since I don't understand most of what is being discussed. I'm posting it for discussion since I know many of the posters here probably will know what's being said. The problem seems to involve most of the popular brands of firewalls, though.

    http://ferruh.mavituna.com/article/?769

    Most of personal firewalls allow shortcuts or interface for controlling traffic. It's simple to bypass these firewalls by a multithreaded program and sending keys or by controlling mouse.

    This flaw enables that any Trojan or similar programs can easily bypass firewall and act as a server or access to another computer. Also most of these firewalls have a "remember" option so if you bypass firewall and successfully exploit it, firewall will never ask again.

    This is a similar threat with shattering attacks, but different method and impact.

    Vulnerable Products (Sending Key Method and Mouse Control);
    These products are vulnerable to both of "Sending Key Method" and "Mouse Control Method"

    Test Platforms;
    Fully Patched Windows XP Professional and Windows 2003 Enterprise Edition (May 19, 2004 - 01.01.2005)


    ZoneAlarm / ZoneAlarm Pro (www.zonelabs.com) | Fixed
    4.5.530.000 - Tested
    4.5.538.001 - Tested
    5 and newer versions are not vulnerable...
    Kerio (www.kerio.com)
    4.0.14 - Tested
    All Versions
    Agnitium Outpost Firewall (www.agnitium.com)
    2.1.303.4009 (314) - Tested
    2.5.369.4608 (369) - Tested
    All Versions
    Kaspersky Anti-Hacker (www.kaspersky.com)
    1.5.119.0 - Tested
    All Versions
    Look 'n' Stop (www.looknstop.com)
    2.04p2 - Tested
    All Versions
    Symantec's Norton Personal Firewall (www.norton.com)
    2004 - Tested
    All Versions

    ***

    Vulnerable Products (Mouse Control);
    These products are only vulnerable to "Mouse Control Method", because they don't accept shortcuts but still vulnerable to "Mouse Control" attacks.


    Panda Platinum Internet Securiy
    8.03 (tested)
    All Versions
    Omniquad Personal Firewall
    1.1 (tested)
    All Versions



    Proof of Concept;
    2 Proof of Concepts attached to advisory (also some other POCs for some firewalls)

    First POC (bypassSendKey.vbs) written in VBScript (.vbs), This POC include required samples for ZoneAlarm, Kerio, Agnitium, Kaspersky Anti-Hacker, Look 'n' Stop and Symantec's Norton Personal Firewall. This script is executing an instance of itself for multithreading and send shortcuts to firewall while first instance trying to connect internet. I didn't write an auto determine firewall function (but it's so easy), so you need to set it by yourself.

    Second (bypassMouseControl.txt) simulates an example of bypassing Zone Alarm Firewall by with mouse control, code in VB.NET. Program is not using a real multithread because some firewalls interrupt executing of program directly. So program is executing another instance of itself with an argument.

    Both of them add themselves to secure app list of firewalls and then bypass active firewall.

    Also I attached testFirewall.vbs for testing your firewall for application control.

    Solution;
    All firewalls should ask password for all kind of "Allow" actions. In fact passwords can be fooled because of its nature but it is the best user friendly / secure solution for protection.

    As a user of these firewalls, if your firewall supports to "deny all default" option, enable it, so your firewall deny all connections by default. After that you may can manually select programs for allow them.

    Final Words;
    This is a methodology for bypassing interacted firewalls so it's possible that this advisory affects other firewalls in market. Also it's possible that future firewalls will be affected too. I think for now this is a serious problem for firewalls, until they imply password/random human need text method for "Allow/Deny" actions.

    History;
    Discovered: 03.05.2004
    Vendors Informed: 28.08.2004
    Published: 03.01.2005
     
  2. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,926
    Location:
    Texas
    Chuck57

    This was posted here yesterday. Thanks.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.