TUCoPS :: Windows Apps :: espg.htm

Esafe Protect Gateway uses only filename extensions to determine what files to scan
Vulnerability

    Esafe Protect Gateway (CVP)

Affected

    Esafe Protect Gateway (CVP) v2.1 build 98

Description

    Hugo van  der Kooij  found following.   The Esafe  Protect Gateway
    (ESPG) does  not scan  some files  in combination  with FireWall-1
    and CVP.

    If you want the Esafe Protect Gateway to scan all content for  the
    presence of a virus you have two options.

        1. Choose to scan anything not listed in the 'safe file types'
           list.  And then clear out all entries in that list.
        2. Choose  to scan  only files  listed in  the 'dangerous file
           types'  list.   And  then  have  only  one extension listed
           namely '*'.

    Deciding to  rely on  extensions seems  an indication  of a flawed
    design allready.  Renaming files  is a common practice and  can be
    done by anyone capable of operating a keyboard.

    The problem is that anything  with the MIME type set  to TEXT/HTML
    will not be scanned  regardless of the options  recommended above.
    A simple test was capable of pointing this out.

    Setup a default Apache server.   Copy a virusfile to two  location
    being http://website/test1.txt  and http://website/test1.html  and
    try  to  download  them  with  your  favorite browser.  The URL is
    unique  and  was  never  used  by  your  browser  to  minimize the
    possibilities of caches being in  place.  But forced reloads  work
    properly and are sufficiant if you want to replicate this issue.

    Downloading http://website/test1.html dows  nothing to detect  the
    virus and  it is  yours.   No protection  is offered.  Downloading
    http://website/test1.txt will not work as ESPG will now  intercept
    the file contain the virus.

    By  adjusting  the  webserver  to  send  out  *.txt  as  MIME type
    TEXT/HTML and *.html as MIME type TEXT/PLAIN you can now test with
    http://website/test2.txt and  http://website/test2.html to  verify
    things.    Downloading  http://website/test2.txt   will  get   you
    infected  as  ESPG  will  not  scan  the  file.   And  downloading
    http://website/test2.html will not work as ESPG detects the  virus
    and will prevent it from downloading.

    This was tested  with Esafe Protect  Gateway v2.1 build  98, virus
    tables dated March 15, 2000.

    Simple situation.  Provide a supposed link to a .movie file  which
    is actually  an executable  with an  embedded .avi  (could be  any
    nonstandard non executable file  type .movie just works  well) for
    download.  The web  server presents this as  video/x-sgi-movie for
    the mime type.   The user saves it  to disk and follows  the brief
    instruction for playing it  by doing a start/run  "start [download
    path]\test.movie" the  trojaned file  looks like  a movie  playing
    and exits but has delivered it's payload in the interim.  Demo:

        - copy notepad.exe to %TEMP%\test.movie
        - do a start/run
        - type in "start [tmpdir]\test.movie"
        - you now have notepad up on the screen.

    The lab tests performed proven that any file using the MIME header
    TEXT/HTML  is  passed  without  verificationi  regardless  of  the
    extension.  Using another vendor's CVP server testers were able to
    verify the issue was not a FireWall-1 problem but in fact that  of
    the ESPG  CVP server.   Trend Micro  did find  the virus  in  both
    TEXT/PLAIN and TEXT/HTML MIME types.

Solution

    The trade off between performance and protection sufficiency is a
    well known issue in the world of data security.  As suggested by
    Mr. Van der Kooij, it is possible to make files go through eSafe
    Gateway without being scanned for viruses, thus creating security
    holes.  eSafe believes that relying on file extension in order to
    avoid threats and virus assaults is highly efficient.  This is
    definitely not due to a "flawed design".  At eSafe, they believe
    that it is possible to achieve a high level of security and
    privacy, while relying on the files extensions.

    The subject described above according  to Esafe is not a  bug, nor
    a security problem.  Hence, no  fix is needed.  On the  other side
    The Dutch  office informed  Hugo van  der Kooij  that the issue is
    now know by  the ID: DR/047  and being handled  by the development
    crew.

    Esafe Protect  Gateway can  at present  not be  trusted to protect
    you from downloading a virus.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH