|
Vulnerability "Stick" Affected IDS products (RealSecure) Description Following is based on a Internet Security Systems Security Alert. ISS X-Force has been researching a new attack tool that can be used to launch a stress test against many popular intrusion detection systems (IDS). The new tool, dubbed "Stick" by its creators, has been reported to reduce performance, and/or deny service to many commercial IDS products. Stick has been reported to direct thousands of overt attacks at IDS systems. The additional processing required by IDS systems to handle the new load causes a Denial of Service (DoS) to manifest. Stick does not employ any new methods, nor does it expose any new flaws in signature-based IDS. Stick uses the very straightforward technique of firing numerous attacks at random from random source IP addresses to purposely trigger IDS events. The IDS system will attempt to keep up with the new flood of events, but if incoming events cross the IDS detection threshold, a DoS might result. The effectiveness of the Stick attack is a function of the attacker's available bandwidth. Stick is essentially a flooding tool, so if a large bandwidth link is available to the attacker, he or she may be more successful. At the time of publication of this Alert, the Stick tool has not been made public. Refer to the following URL for more information about the attack: http://www.eurocompton.net/stick ISS X-Force verified the existence of the vulnerability in the Windows NT and Windows 2000 versions of RealSecure Network Sensor 5. 0. On both Windows platforms, the event channel becomes congested during the duration of the attack. The Network Sensor must be manually reconnected to restore normal operation. At no point does the Network Sensor or Network Console crash. RealSecure running on the Solaris platform does not exhibit any event channel problems during the attack or after the attack is suspended. No reconnection is required. Solution ISS X-Force has developed two fixes for RealSecure Network Sensor that will limit the risk of a Stick attack. The first fix was part of Service Release 1.1 for RealSecure Network Sensor. The second fix will be included in X-Press Update MU 2.2, available on March 15, 2001. X-Press Update MU 2.2 will also include 28 new signatures and can be accessed through the Internet Security Systems Web site.