<<< Date Index >>>     <<< Thread Index >>>

Re: vulnerability in Symantec products



Ummm are you for real? You are posting this as a vulnerability?

Chances are if they have trojaned or gained priviledged access to your 
workstation it shouldnt be
to much trouble to alter config of firewall or skirt outbound connectivity.

Unwise default config, perhaps. Vulnerability ... naah.

Jay

----- Original Message -----
From: security@xxxxxxxxxxxxxx
To: bugtraq@xxxxxxxxxxxxxxxxx
Sent: 26 Oct 2006 22:30:11 -0000
Subject: vulnerability in Symantec products

Critical vulnerability was discovered in Symantec Internet Security 2005, 
posible afected products:
Symantec Personal Firewall 2005, Symantec Internet Security 2004, Symantec 
Personal Firewall 2004, 
Symantec Personal Firewall 2003, Symantec Internet Security 2006, Symantec 
Personal Firewall 2006.

Defective program feature allows to establish remote connections undetected - 
thus creating a
perfect exploit for trojans and hacker activities. Symantec products generally 
have a rule "Default
outbound NetBIOS", allowing programs to establish direct IP connections on 
ports 137, 138, 139.
Therefore, trojan programs can undetectably bypass Symantec firewall and 
connect on these ports to
attacker's remote server. However, resolving IP from DNS will be detected by 
the firewall.

Solutions:
- Disable "Default outbound NetBIOS" rule
- Modify "Default outbound NetBIOS" rule and restrict connections only to LAN

--------------------------------------------------
DimichSoft Security Group
http://www.dimichsoft.com/security.html