TUCoPS :: Security App Flaws :: win5121.htm

Symantec Enterprise Firewall SMTP proxy inconsistencies
25th Feb 2002 [SBWID-5121]
COMMAND

	Symantec Enterprise Firewall SMTP proxy inconsistencies

SYSTEMS AFFECTED

	Symantec Enterprise Firewall (SEF) 6.5.x

PROBLEM

	Martin  O\'Neal  found  following,  as  published  in  Corsaire  Limited
	Security Advisory [http://www.corsaire.com]:
	

	The aim of this document is to clearly define some issues related  to  a
	some SMTP proxy inconsistencies within the Symantec Enterprise  Firewall
	(SEF)       environment       as       provided       by        Symantec
	[http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=47&PID=9674250&EID=0]
	

	

	The SEF firewall product uses an application proxy strategy  to  provide
	enhanced security features for a variety of common  protocols.  For  the
	SMTP proxy, part of this additional functionality  allows  the  firewall
	to restrict  the  sender  /  recipient  domains  and  to  hide  internal
	infrastructure information from external recipients.
	

	However, when the firewall is  configured  to  provide  network  address
	translation  (NAT)  to  an  SMTP  connection  (effectively  hiding   the
	internal server behind a publicly  routable  address),  this  might  not
	always be conducted as desired.
	

	

	 -- Analysis --

	

	The SMTP proxy  works  by  analysing  the  SMTP  format  and  optionally
	rewriting some of the headers to achieve the desired aim.
	

	When an inbound or outbound SMTP  connection  is  NATed  to  an  address
	other than the one assigned to the  physical  firewall  interface,  then
	the SMTP proxy still  uses  the  physical  interface  name  and  address
	within the SMTP protocol exchange.
	

	This has two potential issues:
	

	The first issue is that there  is  now  a  potential  information  leak;
	additional information is contained within the  SMTP  protocol  exchange
	that could aid an attacker in analysing the firewall configuration.
	

	The  second  issue  is  that  any  receiving  /  sending  host  that  is
	configured to enforce strict  checks  on  the  SMTP  protocol  exchange,
	might not accept the  connection  due  to  the  inconsistencies  in  the
	fields.
	

	

	 -- Proof of concept --

	

	To reproduce this issue, place an SMTP host on an internal interface  of
	the SEF firewall.  Create  a  rule  that  allows  inbound  and  outbound
	traffic to this
	

	host, then create an address  translation  and  redirection  entry  that
	maps SMTP connections to and from an external  address  other  than  the
	physical interface address.
	

	

	smtp address (internal)                1.1.1.1 (twist.dance.org)

	firewall address (external physical)   2.2.2.2 (waltz.dance.org)

	firewall address (external SMTP NAT)   2.2.2.254 (foxtrot.dance.org)

	firewall name                          tango

	firewall domain                        dance.org

	

	redirect                               2.2.2.254 -> 1.1.1.1 (for SMTP only)

	NAT                                    1.1.1.1 -> any (use 2.2.2.254)

	NAT                                    any -> 1.1.1.1 (use client address)

	rule                                   1.1.1.1 -> any (for SMTP only)

	rule                                   any -> 1.1.1.1 (for SMTP only)

	

	

	For inbound connections to 2.2.2.254:
	

	-> 220 tango.dance.org Generic SMTP handler

	

	

	For outbound connections from 2.2.2.254:
	

	<- 220 ...

	-> HELO waltz.dance.org

	<- 250 ... talking to foxtrot.dance.org ([2.2.2.254])

	

	

	

	

SOLUTION

	Accordingly     with     Symantec\'s      answer,      available      at
	http://securityresponse.symantec.com/avcenter/security/Content/2002.02.20.html
	:
	

	 Solution

	 ========

	

	Bug will be corrected in near-future release version 8
	

	

	 Workarounds

	 ===========

	

	- Configure Symantec Enterprise Firewall to use the same  name  for  the
	firewall name and the firewall external interface name.
	

	- If NAT is not needed, use  the  SMTP  wizard  included  with  Symantec
	Enterprise Firewall to set up rules and redirects for  all  inbound  and
	outbound SMTP traffic.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH