Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Firewall)  >   Juniper ScreenOS Vendors:   NetScreen
NetScreen Firewall Bridging Flaw Lets Remote Users Bypass the Firewall With Non-IP Packets
SecurityTracker Alert ID:  1007148
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jul 9 2003
Impact:   Host/resource access via network
Exploit Included:  Yes  

Description:   Paul (InquisiTeam) reported a vulnerability in NetScreen firewall products when operating in bridge mode. A remote user can send Ethernet packets containing protocols other than IP and ARP through the firewall.

It is reported that Bridge Mode on the NetScreen 20x and 50x series models provide an option to "bypass non-IP traffic". The firewall will reportedly bypass broadcast Ethernet frames with non-IP protocols even if this option is not checked. According to the report, the processing of the packets is not logged.

All interfaces can be reached, including the administrative firewall zone, it is reported.

The vendor has reportedly been notified.

Impact:   A remote user can bypass the firewall and connect to systems through the firewall using non-IP protocols.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 10 2003 (Vendor Confirms and Plans a Fix) Re: NetScreen Firewall Bridging Flaw Lets Remote Users Bypass the Firewall With Non-IP Packets
The vendor has confirmed the vulnerability and plans to issue a fix.

 Source Message Contents

Subject:  piercing NetScreen firewalls

SUBJECT: piercing NetScreen firewalls

This is an advisory of a major flaw discovered on
NetScreen firewall devices. You may publish it
"as is".
The software vendor -- NetScreen Technologies --
was notified 3 weeks ago.



There is no way to configure NetScreen firewalls
so as to block traffic carried by protocols other than
IP and ARP (this occurs at least in bridge mode on 20x
and 50x models, with the latest version of screenOS).

For instance, brodcast frames carrying protocols like
SNA, IPX CDP, CDP, VST ... will all happily cross the
firewall in and out without being checked nor logged,
possibly reaching remote parts of corporate networks.

   Even the zone used for managing the firewall
   is not immune !!!

   Not only is the flaw infamous, but here is the worst:
NetScreen devised a FAKE, dummy screening option:
"bypass non-IP traffic". Toggling it on or off has
absolutely no effect: The NetScreen firewall standing
in the middle this times really deserves being called

It seems that the lower layers of NetScreen devices are
(poorly) designed like switches or hubs -- which means
the exact opposite of security.
They talk you about VLANs and these have a bad bad reputation.


The flaw is infamous because it allows communications
to be established thru the Netscreen device in any direction
between arbitrary hosts, I mean hosts which you probably
classified as unreachable
... from the IP point of view ...
   Indeed, many network architects have only protocol "IP"
in mind when thinking about routing and firewall rules
-- this is a common blunder.

Suppose you are an external bad guy, Mr H.
Using Ethernet broadcast, you can sweep entire networks
behind NetScreen firewalls, including the sensitive
administration zone !!!
   Thus, from outside, Mr H can hope that a router or
mainframe machine will answer CDP or SNA protocols.
Maybe Mr H will then be able to join a cluster of Cisco
routers, take control and bounce/penetrate further.
   Or maybe that, Mr H is really skilled or just a spy and
that the frames (s)he sends will wake a dormant backdoor
providing control access to some deeply nested host.

Provided some traffic can flow without control and getting
logged, nor noticed by commercial Intrusion Detection Systems,
nearly everything is possible; limits are the imagination's.

For instance, you can think about using the channel
as an IP tunnel, using the internal host as a VPN gateway
to scan and penetrate further.

Risks are incredibly high: one single forgotten or untrusted
machine in your internal networks can compromise everything.
And no security policy can handle this; besides, how would you
be aware of a dormant backdoor ?

e.g. check
for vulnerabilities in Cisco's products and have a thrill.


In the past few years, piercing vulnerabilities have been
discovered, but it seems that the community focused too much
on IP only: Great, complicated exploits using fragmentation
attacks were published (defeating the state engine of IPFilter
and Firewall-1),
... but the simple, raw aspects of layer-2/layer-3 filtering
seem to have been completely overlooked.

It would be intersting to probe other firewall products
for similar flaws.

When you pretend to sell a firewall, ensure that
it blocks traffic which it is not able to inspect !!!

If you don't want to run into issues like these,
use either open source or firewalls -- and software versions !--
that are agreed for diplomatic and military communications.

Paul -- civil counter-spy
Get OperaMail Premium today - USD 29.99/year

Powered by Outblaze


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC