__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN Check Point FireWall-1 HTTP Security Server Vulnerability February 5, 2004 21:00 GMT Number O-072 [REVISED 9 Feb 2004] ______________________________________________________________________________ PROBLEM: A parsing format string vulnerability has been identified in the HTTP Application Intelligence component of Check Point's FireWall-1. Application Intelligence functions as an application proxy between untrusted networks and network servers for detecting and preventing potential attacks. The vulnerabilities also exist within the HTTP Security Server application proxy that ships with all versions of FireWall-1. PLATFORM: Check Point FireWall-1 DAMAGE: A remote attacker could gain root access to the Firewall-1 server, which could then allow possible compromises to other systems on the network. SOLUTION: Install Check Point's update to FireWall-1. ______________________________________________________________________________ VULNERABILITY The risk is HIGH. A remote attacker could gain root access ASSESSMENT: to the Firewall-1 server, which could then allow possible compromises to other systems on the network. ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/o-072.shtml ORIGINAL BULLETIN: http://xforce.iss.net/xforce/alerts/id/162 PATCHES: http://www.checkpoint.com/techsupport/alerts/ security_server.html ______________________________________________________________________________ Revision History: 2/9/04: We are unable to update the ISS text below due to legal issues at this time. Please see Check Point and/or ISS for their updates on affected versions. FireWall-1 HTTP Security Server Vulnerability http://checkpoint.com/techsupport/alerts/security_server.html ISS http://xforce.iss.net/xforce/alerts/id/162 [ ****** Start of ISS Security Advisory ***** ] Internet Security Systems Security Brief February 4, 2004 Checkpoint Firewall-1 HTTP Parsing Format String Vulnerabilities Synopsis: ISS X-Force has discovered a flaw in the HTTP Application Intelligence component of Firewall-1. Application Intelligence is a relatively recent addition to the Firewall-1 product line and functions as an application proxy between untrusted networks and network servers for the purpose of detecting and preventing potential attacks. The vulnerabilities also exist within the HTTP Security Server application proxy that ships with all versions of Firewall-1 (including those prior to Application Intelligence releases). The affected components contain several remotely exploitable format string vulnerabilities. Impact: If HTTP Application Intelligence is enabled or the HTTP Security Server is used, a remote unauthenticated attacker may exploit one of these vulnerabilities and execute commands under the security context of the super-user, usually "SYSTEM", or "root". This attack may lead to direct compromise of the Firewall-1 server. Remote attackers may leverage this attack to successfully compromise heavily hardened networks by modifying or tampering with the firewall rules and configuration. Affected Versions: Checkpoint Firewall-1 NG-AI R55, R54, including SSL hotfix Checkpoint Firewall-1 HTTP Security Server included with NG FP1, FP2, FP3 Checkpoint Firewall-1 HTTP Security Server included with 4.1 For the complete ISS X-Force Security Advisory, please visit: http://xforce.iss.net/xforce/alerts/id/162 ______ About Internet Security Systems (ISS) Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a pioneer and world leader in software and services that protect critical online resources from an ever-changing spectrum of threats and misuse. Internet Security Systems is headquartered in Atlanta, GA, with additional operations throughout the Americas, Asia, Australia, Europe and the Middle East. Copyright (c) 2004 Internet Security Systems, Inc. All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this document. It is not to be edited or altered in any way without the express written consent of the Internet Security Systems X-Force. If you wish to reprint the whole or any part of this document in any other medium excluding electronic media, please email xforce@iss.net for permission. Disclaimer: The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information. X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, as well as at http://www.iss.net/security_center/sensitive.php Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc. [ ****** End of ISS Security Advisory ***** ] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Internet Security Systems, Inc. (ISS) and Check Point for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) O-063: Red Hat Elevated Privileges Vulnerability O-064: HP 'rwrite' Utility Vulnerability O-065: Security Vulnerabilities in ASN.1 O-066: Cisco - Voice Product Vulnerabilities on IBM Servers O-067: Sun Vulnerability with Loading Arbitrary Kernel Modules CIACTech04-001: Remote Detection of the MyDoom.A Worm O-068: Microsoft Internet Explorer Cumulative Patch O-069: Sun kcms_server Daemon Vulnerability O-070: Sun Basic Security Module (BSM) Vulnerability O-071: Debian kernel-patch-2.4.17-mips Interger Overflow