Syworks SafeNET Policy File Vulnerability

2006.06.13
Risk: Medium
Local: Yes
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 2.1/10
Impact Subscore: 2.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

Title: [Kil13r-SA-20060605] Syworks SafeNET Policy File Vulnerability Author: Kil13r - http://www.kil13r.info/ Local / Remote: Local Timeline: 2006/04/18 - Discovery 2006/06/05 - Release Affected version: All version of Syworks SafeNET Not affected version: In this time, none Description: Syworks SafeNET is network resource protection solution which organized by client/server, but that has serious vulnerability. It has client policy file that can be modified by end user. In file of policy.dat 08h to 16h: Ascii value of Syworks SafeNET server address 18h: The switch of Syworks SafeNET client (On: 0x01, Off: 0x00) 1ch to 1dh: ICMP limit (0x0000 to 0xFFFF) 20h to 21h: Broadcast limit (0x0000 to 0xFFFF) 24h to 25h: Session limit (0x0000 to 0xFFFF) 28h: Session limit violation allowed time (0x00 to 0xFF) 2ah: The switch which blocking continuous violation (On: 0x01, Off: 0x00) 2ch: Continuous violation allowed time (0x00 to 0xFF) 2fh: The switch which warning continuous violation (On: 0x01, Off: 0x00) 31h: The switch which disallowing Syworks SafeNET client termination by end user (On: 0x01, Off: 0x00) 33h: The switch which disallowing Syworks SafeNET client icon in tray (On: 0x01, Off: 0x00) 3eh to 41h: Problem autoreport interval (0x00000000 to 0xFFFFFFFF) If attacker modify client policy file, attacker can consume all of network resource. Proof of Concept code: None Proof of Concept example: None Proof of Concept screenshot: None


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top