SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Syworks SafeNET Vendors:   Syworks
Syworks SafeNET Policy File Lets Local Users Deny Service
SecurityTracker Alert ID:  1016231
SecurityTracker URL:  http://securitytracker.com/id/1016231
CVE Reference:   CVE-2006-2967   (Links to External Site)
Updated:  May 22 2009
Original Entry Date:  Jun 6 2006
Impact:   Denial of service via local system


Description:   A vulnerability was reported in Syworks SafeNET. A local user can cause denial of service conditions.

A local user can modify the 'policy.dat' file to cause the system to consume excessive network resources.

Kil13r reported this vulnerability.

Impact:   A local user can cause the system to consume excessive network resources.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.syworks.com/product/safenet/product_safenet_entry.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [Kil13r-SA-20060605] Syworks SafeNET Policy File Vulnerability

Title:
[Kil13r-SA-20060605] Syworks SafeNET Policy File Vulnerability

Author:
Kil13r - http://www.kil13r.info/

Local / Remote:
Local

Timeline:
2006/04/18 - Discovery
2006/06/05 - Release

Affected version:
All version of Syworks SafeNET

Not affected version:
In this time, none

Description:
Syworks SafeNET is network resource protection solution which organized by client/server, but that has serious vulnerability.
It has client policy file that can be modified by end user.

In file of policy.dat
08h to 16h: Ascii value of Syworks SafeNET server address
18h: The switch of Syworks SafeNET client (On: 0x01, Off: 0x00)
1ch to 1dh: ICMP limit (0x0000 to 0xFFFF)
20h to 21h: Broadcast limit (0x0000 to 0xFFFF)
24h to 25h: Session limit (0x0000 to 0xFFFF)
28h: Session limit violation allowed time (0x00 to 0xFF)
2ah: The switch which blocking continuous violation (On: 0x01, Off: 0x00)
2ch: Continuous violation allowed time (0x00 to 0xFF)
2fh: The switch which warning continuous violation (On: 0x01, Off: 0x00)
31h: The switch which disallowing Syworks SafeNET client termination by end user (On: 0x01, Off: 0x00)
33h: The switch which disallowing Syworks SafeNET client icon in tray (On: 0x01, Off: 0x00)
3eh to 41h: Problem autoreport interval (0x00000000 to 0xFFFFFFFF)

If attacker modify client policy file, attacker can consume all of network resource.

Proof of Concept code:
None

Proof of Concept example:
None

Proof of Concept screenshot:
None

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC