[22266] in bugtraq

home help back first fref pref prev next nref lref last post

Re: HTML Form Protocol Attack

daemon@ATHENA.MIT.EDU (Gustavo Molina)
Thu Aug 16 01:44:18 2001

From: Gustavo Molina <gustavobt@molina.com.br>
To: bugtraq@securityfocus.com
Date: Thu, 16 Aug 2001 00:30:49 -0300
Reply-To: gustavobt@molina.com.br
Message-ID: <j7fmnt0e3vs0vm4smnuhchflohui41i30h@4ax.com>
In-Reply-To: <20010816024912.A14332@purple.chu.cam.ac.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit

On Wed, 15 Aug 2001 23:48:19 -0300 (SPO) , Barnaby Gray <bgrg2@cam.ac.uk>
(Barnaby Gray) wrote:

>You're right, after attempted again I managed to get it to login to my
>FTP server, but ftp was not the best protocol to try it on considering
>the way data back from the server is sent, which there's no way of
>fiddling.

I believe using this attack it may be possible to remotely open a netfilter
(iptables) based firewall, if kernel < 2.4.5, using another bug shown in Red Hat
Advisory RHSA-2001:052-02 / Issue date: 2001-04-19. That is, according to the
advisory: 

'A vulnerability in iptables "RELATED" connection tracking has been
discovered. When using iptables to allow FTP "RELATED" connections
through the firewall, carefully constructed PORT commands can open
arbitrary holes in the firewall.'

[]'s
Gustavo Molina
Network Administrator - Sao Paulo - Brazil

home help back first fref pref prev next nref lref last post