Cisco Secure PIX Firewall漏洞

Cisco Secure PIX Firewall漏洞

漏洞ID 1106020 漏洞类型 未知
发布时间 2000-09-19 更新时间 2005-05-02
图片[1]-Cisco Secure PIX Firewall漏洞-安全小百科CVE编号 CVE-2000-1022
图片[2]-Cisco Secure PIX Firewall漏洞-安全小百科CNNVD-ID CNNVD-200012-055
漏洞平台 Hardware CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/20231
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200012-055
|漏洞详情
CiscoSecurePIXFirewall5.2(2)及其早期版本的mailguard特性不能正确限制访问到STMP命令。远程攻击者通过在发送限制命令之前发送DATA命令执行限制命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/1698/info

Like other firewalls, the Cisco PIX Firewall implements technology that reads the contents of packets passing through it for application-level filtering. In the case of SMTP, it can be configured so only certain smtp commands can be allowed through (for example, dropping extra functionality, such as HELP or commands that could be a security concern, like EXPN or VRFY). When recieving messages, it allows all text through between "data" and "<CR><LF><CR><LF>.<CR><LF>", as this is where the body of the message would normally go and there could be words in it that are smtp commands which shouldn't be filtered. Due to the nature of SMTP and flaws in exceptional condition handling of PIX, it is reportedly possible to evade the smtp command restrictions by tricking the firewall into thinking the body of the message is being sent when it isn't.

During communication with an smtp server, if the "data" command is sent before the more important information is sent, such as "rcpt to", the smtp server will return error 503, saying that rcpt was required. The firewall, however, thinks everything is alright and will let everything through until recieving "<CR><LF><CR><LF>.<CR><LF>". It is then possible for the attacker to do whatever he wishes on the email server. 

Here an example of what i could do exploiting this bug:
helo ciao
mail from: [email protected]
data ( From here pix disable fixup)
expn guest ( Now i could enumerate user
vrfy oracle and have access to all command)
help
whatever command i want
quit
|参考资料

来源:XF
名称:cisco-pix-smtp-filtering
链接:http://xforce.iss.net/static/5277.php
来源:BID
名称:1698
链接:http://www.securityfocus.com/bid/1698
来源:CISCO
名称:20001005CiscoSecurePIXFirewallMailguardVulnerability
链接:http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml
来源:BUGTRAQ
名称:20000920Re:CiscoPIXFirewall(smtpcontentfilteringhack)-Version4.2(1)notexploitable
链接:http://archives.neohapsis.com/archives/bugtraq/2000-09/0241.html
来源:BUGTRAQ
名称:20000919CiscoPIXFirewall(smtpcontentfilteringhack)
链接:http://archives.neohapsis.com/archives/bugtraq/2000-09/0222.html

相关推荐: Microsoft Windows XP/2000/2003 – ‘winhlp32’ Phrase Heap Overflow

Microsoft Windows XP/2000/2003 – ‘winhlp32’ Phrase Heap Overflow 漏洞ID 1054842 漏洞类型 发布时间 2004-12-23 更新时间 2004-12-23 CVE编号 N/A CNNVD…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享