CVE-2000-0692
CVSS5.0
发布时间 :2000-10-20 00:00:00
修订时间 :2008-09-05 16:21:39
NMCOS    

[原文]ISS RealSecure 3.2.1 and 3.2.2 allows remote attackers to cause a denial of service via a flood of fragmented packets with the SYN flag set.


[CNNVD]ISS RealSecure 3.2.x Fragmented SYN数据包DoS漏洞(CNNVD-200010-084)

        ISS RealSecure 3.2.1和3.2.2版本存在漏洞。远程攻击者可以借助带有SYN标志设置的分段数据包导致服务拒绝。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:iss:realsecure:3.2.1Internet Security Systems RealSecure 3.2.1
cpe:/a:iss:realsecure:3.2.2Internet Security Systems RealSecure 3.2.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0692
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0692
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200010-084
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/bugtraq/2000-08/0267.html
(VENDOR_ADVISORY)  BUGTRAQ  20000822 DOS on RealSecure 3.2
http://www.securityfocus.com/bid/1597
(VENDOR_ADVISORY)  BID  1597

- 漏洞信息

ISS RealSecure 3.2.x Fragmented SYN数据包DoS漏洞
中危 其他
2000-10-20 00:00:00 2005-10-20 00:00:00
远程※本地  
        ISS RealSecure 3.2.1和3.2.2版本存在漏洞。远程攻击者可以借助带有SYN标志设置的分段数据包导致服务拒绝。

- 公告与补丁

        The official response from ISS on this issue is as follows:
        We have currently identified and can confirm the
         following based on exploit information in the security bulletin and what
         we have received from Modulo and ISS research of the issues:
         (1) A patch for Network Sensor 3.2.2 is available to
         fix the Syn Flood issue. You must have an updated maintenance license
         before downloading and installing this patch. Please read the release
         notes first before installing. The patch can be downloaded at:
        
         ftp://ftp.iss.net/private/support/patch/realsecure32/
         (2) RealSecure 5.0 is not affected by the Syn Flood
         issue brought up in the security bulletin,
         (3) The command provided by Modulo produces a flood
         of ipfrag events (thus throttling the console), but does not otherwise
         affect the engine. RealSecure Network Sensor 5.0 contains a filter on the
         ipfrag event which prevents it from being logged more than once per source
         ip / destination ip pair.
        Since RealSecure Network Sensor 3.2 supports the
         advanced dialog through the console's policy editor, the ipfrag event can
         be tweaked to also use these same filter settings, preventing the console
         flood:
         same_source_ip
         same_destinaion_ip
         protect_from_flood

- 漏洞信息

3208
ISS RealSecure Fragmented SYN Packet DoS
Denial of Service
Loss of Availability

- 漏洞描述

Internet Security Systems RealSecure intrusion detection software contains a flaw that allows a remote denial of service. The issue is caused when an attacker sends a specially crafted fragmented packets with the SYN flag set. When the sensor receives these, it will overflow a buffer and crash the sensor.

- 时间线

2000-08-22 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, ISS has released a patch (3.2.2patch) to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

ISS RealSecure 3.2.x Fragmented SYN Packets DoS Vulnerability
Failure to Handle Exceptional Conditions 1597
Yes Yes
2000-08-22 12:00:00 2009-07-11 02:56:00
Posted to bugtraq in a Modulo Security Labs advisory by Andre Fucs de Miranda <afucs@modulo.com.br>.

- 受影响的程序版本

Internet Security Systems RealSecure 3.2

- 漏洞讨论

ISS RealSecure 3.2.x can be disabled remotely via fragmented packets with the SYN flag set.

On NT, after crashing the service will restart, and generates an Application Log event. If the packets are continuosly resent, detection is effectively halted while the service repeatedly restarts.

On Solaris, the process crashes, all detection stops, and a report is generated to the console. Also, on Solaris it is possible to crash the process with a flood of unfragmented packets if certain flgas (in addition to SYN) are set.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

The official response from ISS on this issue is as follows:

We have currently identified and can confirm the
following based on exploit information in the security bulletin and what
we have received from Modulo and ISS research of the issues:

(1) A patch for Network Sensor 3.2.2 is available to
fix the Syn Flood issue. You must have an updated maintenance license
before downloading and installing this patch. Please read the release
notes first before installing. The patch can be downloaded at:

ftp://ftp.iss.net/private/support/patch/realsecure32/

(2) RealSecure 5.0 is not affected by the Syn Flood
issue brought up in the security bulletin,

(3) The command provided by Modulo produces a flood
of ipfrag events (thus throttling the console), but does not otherwise
affect the engine. RealSecure Network Sensor 5.0 contains a filter on the
ipfrag event which prevents it from being logged more than once per source
ip / destination ip pair.

Since RealSecure Network Sensor 3.2 supports the
advanced dialog through the console's policy editor, the ipfrag event can
be tweaked to also use these same filter settings, preventing the console
flood:
same_source_ip
same_destinaion_ip
protect_from_flood

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站