Check Point Firewall-1 SMTP资源消耗漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1105905 漏洞类型 其他
发布时间 2000-06-30 更新时间 2006-01-04
CVE编号 CVE-2000-0582 CNNVD-ID CNNVD-200006-117
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20049
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200006-117
|漏洞详情
CheckPointFireWall-14.0和4.1版本存在漏洞。远程攻击者通过发送无效命令流(例如二进制0)到SMTP安全服务器代理导致拒绝服务。
|漏洞EXP
source: http://www.securityfocus.com/bid/1416/info

The Check Point Firewall-1 SMTP Security Server in Firewall-1 4.0 and 4.1 on Windows NT is vulnerable to a simple network-based attack which can increase the firewall's CPU utilization to 100%. Sending a stream of binary zeros (or other invalid SMTP commands) to the SMTP port on the firewall raises the target system's load to 100% while the load on the attacker's machine remains relatively low. According to Check Point Software this only disables mail relay while allowing other firewall operations to continue normally. 


This can easily be reproduced from a Linux system using netcat with an input of /dev/zero, with a command such as "nc firewall 25 < /dev/zero".
|参考资料

来源:BUGTRAQ
名称:20000630SecureXpertAdvisory[SX-20000620-3]
链接:http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000630162106.4619C-100000@fjord.fscinternet.com
来源:www.checkpoint.com
链接:http://www.checkpoint.com/techsupport/alerts/list_vun.html#SMTP_Security
来源:BID
名称:1416
链接:http://www.securityfocus.com/bid/1416
来源:OSVDB
名称:1438
链接:http://www.osvdb.org/1438