[20619] in bugtraq
Corsaire Limited Security Advisory - Symantec/Axent NetProwler 3.
daemon@ATHENA.MIT.EDU (Martin O'Neal)
Tue May 15 05:52:53 2001
Message-ID: <B0EE7658D55FD411AE3A00508BC253EE17440A@mariana.corsaire.com>
From: "Martin O'Neal" <BugTraq@corsaire.com>
To: BUGTRAQ@securityfocus.com
Date: Thu, 10 May 2001 10:25:34 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
-- Corsaire Limited Security Advisory --
Title: Symantec/Axent NetProwler 3.5.x database configuration
Date: 07.04.01
Application: Symantec/Axent NetProwler 3.5.x
Environment: WinNT
Author: Martin O'Neal [martin.oneal@corsaire.com]
Audience: General distribution
-- Scope --
The aim of this document is to clearly define some issues related to
a potentially unsound database configuration within the NetProwler
application environment as provided by Symantec/Axent [1].
-- History --
Vendor notified: 07.04.01
Document released: 09.05.01
-- Overview --
The latest version of the NetProwler intrusion detection product comes
as a three-tiered architecture, consisting of agents, a management
component, and a console. Both configuration and auditing information
is stored within a MySQL database hosted locally on the management tier
of the product. This database is exposed unnecessarily to potential
network scrutiny due to being configured by default to listen to all
local IP addresses.
-- Analysis --
The MySQL database included with the NetProwler product is used to
store both configuration and auditing information on the management tier.
This is accessed via an ODBC connection on the default MySQL port
(TCP/3306).
Because it is possible to connect to the databases remotely, if the
correct access password can be obtained (see Corsaire advisory
010317-001a [2]), it is possible to amend the data contained within them,
or simply delete the databases causing a denial of service in the
management tier.
In theory, using this flaw it is feasible to disable the IDS capabilities
of NetProwler, perform whatever attack is required, and then reconfigure
the host to its prior state.
As a proof of concept, a tool was created that simply deletes the
NetProwler databases causing a denial of service. This was provided to
the vendor, but will not be made freely available..
-- Recommendations --
The MySQL databases do not need to be accessed by remote systems, so the
MySQL engine can be configured to listen to localhost only. To do this,
edit the c:\my.cnf file and add the following line, then restart the host:
[MySQLd]
bind-address=127.0.0.1
-- References --
[1] http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=
50&PID=3061537
[2] http://www.corsaire.com/advisories/010317-001a.txt
-- Revision --
Initial release.
Copyright 2001 Corsaire Limited. All rights reserved.
----------------------------------------------------------------------
CONFIDENTIALITY: This e-mail and any files transmitted with it are
confidential and intended solely for the use of the recipient(s) only.
Any review, retransmission, dissemination or other use of, or taking
any action in reliance upon this information by persons or entities
other than the intended recipient(s) is prohibited. If you have
received this e-mail in error please notify the sender immediately
and destroy the material whether stored on a computer or otherwise.
----------------------------------------------------------------------
DISCLAIMER: Any views or opinions presented within this e-mail are
solely those of the author and do not necessarily represent those
of Corsaire Limited, unless otherwise specifically stated.
----------------------------------------------------------------------
Corsaire Limited, 3 Tannery House, Tannery Lane, Send, Surrey GU23 7EF
Telephone:+44(0)1483-226000 Email:info@corsaire.com