5th Aug 2002 [SBWID-5595]
COMMAND
Raptor Firewall predicatble TCP Initial Sequence Number
SYSTEMS AFFECTED
Raptor Firewall 6.5 (Windows NT)
Raptor Firewall V6.5.3 (Solaris)
Symantec Enterprise Firewall 6.5.2 (Windows 2000 and NT)
Symantec Enterprise Firewall V7.0 (Solaris)
Symantec Enterprise Firewall 7.0 (Windows 2000 and NT)
VelociRaptor Model 500/700/1000
VelociRaptor Model 1100/1200/1300
Symantec Gateway Security 5110/5200/5300
PROBLEM
In Kristof Philipsen [kristof.philipsen@ubizen.com] of Ubizen
Luxembourg [http://www.ubizen.com] advisory :
During the transport and forwarding of packets, Initial Sequence Numbers
("ISNs") are generated by the Raptor Firewall's IP stack. A weakness in
the generation of these ISNs could allow a remote attacker to easily
predict the sequence numbers for a certain session.
The generation of the ISNs is based on two factors: the source and
destination port, and the source and destination IP. For a single connection,
there is an initial sequence number which will not change for a certain
[long] amount of time. An example connection ("session") can be described
as follows:
session = {[src ip:src port] [dst ip:dst port]}
An ISN is attributed to a specific sessions for a certain amount of
time. Below are some excerpts of real-life tests performed against a
Raptor Firewall, demonstrating this vulnerability. The following tests
sends SYN packets from a source address [x.x.x.x] on a source-port
[1700] to a destination address [z.z.z.z] on a destination port [80]
over a period of several minutes.
-------------------------------------------------------------------
Timeline Connection ISN Delta
-------------------------------------------------------------------
10:33:05 x.x.x.x:1700 -> z.z.z.z:80 2088144436 -
10:33:06 x.x.x.x:1700 -> z.z.z.z:80 2088144436 0
10:33:07 x.x.x.x:1700 -> z.z.z.z:80 2088144436 0
...
10:35:30 x.x.x.x:1700 -> z.z.z.z:80 2088144436 0
10:35:31 x.x.x.x:1700 -> z.z.z.z:80 2088144436 0
10:35:32 x.x.x.x:1700 -> z.z.z.z:80 2088144436 0
...
10:50:43 x.x.x.x:1700 -> z.z.z.z:80 2088144436 0
10:50:44 x.x.x.x:1700 -> z.z.z.z:80 2088144436 0
10:50:45 x.x.x.x:1700 -> z.z.z.z:80 2088144436 0
As shown above, this test clearly shows that the Initial Sequence Number
does not change for a significant amount of time. Another test showed
that when an ISN is assigned to a session, this session and ISN are
stored for future use for a certain amount of time, regardless whether
or not several new sessions are established from the same source IP.
This issue has been reproduced against 6 Raptor Firewalls, each belonging
to different administrative bodies.
* The ISN for each session is different, but for a single session
the ISN doesn't change for a considerable amount of time.
* This could possibly allow an attacker to hijack the session.
* This issue affects all vulnerabilities handled by the Raptor IP
stack, including all sessions to and traversing the Raptor
Firewall.
SOLUTION
Symantec has released HotFixes to resolve this issue. They can be found
at the following locations:
Technical Bulletin:
http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html
Patches and HotFixes:
http://www.symantec.com/techsupp/
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH