[24638] in bugtraq

home help back first fref pref prev next nref lref last post

ZyXEL ZyWALL10 DoS

daemon@ATHENA.MIT.EDU (=?iso-8859-1?Q?Knud_Erik_H=F8jgaar)
Tue Mar 12 17:32:26 2002

Content-Class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Date: Mon, 11 Mar 2002 12:21:56 +0100
Message-ID: <6096F6426539904EB650ED340F28450BCCBE07@Helium.cc.CyberCity.dk>
From: =?iso-8859-1?Q?Knud_Erik_H=F8jgaard?= <knud@cybercity.dk>
To: <bugtraq@securityfocus.com>
Content-Transfer-Encoding: 8bit

[vendor status]
About half a year ago I found a 'funny' DoS condition in the ZyWALL10. ZyXEL was informed, and they at least confirmed the bug, but i believe that's all i heard. According to www.zyxel.com a new firmware for the ZyWALL10 was released 2002/01/10 - i wrote an email to a ZyXEL employee, and the bug is fixed in this version.

[description]
The DoS is simple, using nemesis-arp (from The NEMESIS Project) or a similar tool (like arp-fun) it's possible to make the firewall drop its LAN connection. 

If you send an arp packet containing some bogus/random MAC address  and the firewalls ip to the firewalls lan interface the firewall will 'down' the lan interface and never 'up' it again. The firewall needs a powercycle to restore function, but thats not all. The firewall never 'reopens' the lan interface, so you need to connect via a console cable, go to the lan setup menu, and press enter a few times to 'confirm' the settings to get it back in working order. Sort of a pain in the rear if the firewall is behind a locked door.. 

[reproduction] 
nemesis-arp -S 10.0.0.1 -D 10.0.0.1 -h de:ad:ba:be:f0:0d -d ed1 

(in this case the firewall's IP is 10.0.0.1 and the ethernet adapter is ed1)

[hello]
Manzon, Merkinball, SiGNOUT, evilpoo, ewadoh, |ole|, zaarnik, ZyXEL.

[bye]
From me, Knud Erik Højgaard.

home help back first fref pref prev next nref lref last post