Date: Sep 28 2000 08:09:40 EDT
From: "Kevison Dennys Carrilho Bentes" <[EMAIL PROTECTED]>
Subject: [redewan] Fw: Cisco Security Advisory: Cisco Secure PIX Firewall Mailguard Vulnerab

----- Original Message -----
From: "Cisco Systems Product Security Incident Response Team"
<[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, September 27, 2000 12:10 PM
Subject: Cisco Security Advisory: Cisco Secure PIX Firewall Mailguard
Vulnerability


> -----BEGIN PGP SIGNED MESSAGE-----
>
>
>                Cisco Secure PIX Firewall Mailguard Vulnerability
>
> Revision 1.0
>
>   For public release 2000 Sept 27 08:00 AM US/Pacific (UTC+0700)
>      _________________________________________________________________
>
> Summary
>
>    The Cisco Secure PIX firewall feature "mailguard," which limits SMTP
>    commands to a specified minimum set of commands, can be bypassed.
>
>    This vulnerability can be exploited to bypass SMTP command filtering.
>
>    This vulnerability has been assigned Cisco bug ID CSCdr91002 and
>    CSCds30699.
>
>    The complete advisory is available at
>    http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml.
>
> Affected Products
>
>    All users of Cisco Secure PIX Firewalls with software versions up to
>    and including 4.4(5), 5.0(3), 5.1(2) and 5.2(1) that provide access to
>    SMTP Mail services are at risk.
>
>    The IOS Firewall featureset is not affected by either of the above
>    defects.
>
> Details
>
>    The behavior is a failure of the command "fixup protocol smtp
>    [portnum]", which is enabled by default on the Cisco Secure PIX
>    Firewall.
>
>    If you do not have protected Mail hosts with the accompanying
>    configuration (configuration example below) you are not affected by
>    this vulnerability.
>
>    To exploit this vulnerability, attackers must be able to make
>    connections to an SMTP mail server protected by the PIX Firewall.  If
>    your Cisco Secure PIX Firewall has configuration lines similar to the
>    following:
>
>              fixup protocol smtp 25
>
>    and either
>
>              conduit permit tcp host 192.168.0.1 eq 25 any
>
>    or
>
>              conduit permit tcp 192.168.0.1 255.255.255.0 eq 25 any
>
>    or
>
>              access-list 100 permit tcp any host 192.168.0.1 eq 25
>              access-group 100 in interface outside
>
>    The expected filtering of the Mailguard feature can be circumvented by
>    an attacker.
>
>   Impact
>
>    The Mailguard feature is intended to help protect weakly secured mail
>    servers.  The workaround for this issue is to secure the mail servers
>    themselves, or upgrade to fixed PIX firewall code.
>
>    In order to exploit this vulnerability, an attacker would need to also
>    exploit the mailserver that is currently protected by the PIX.  If
>    that server is already well configured, and has the latest security
>    patches and fixes from the SMTP vendor, that will minimize the
>    potential for exploitation of this vulnerability.
>
> Software Versions and Fixes
>
>   Getting Fixed Software
>
>    Cisco is offering free software upgrades to remedy this vulnerability
>    for all affected customers. Customers with service contracts may
>    upgrade to any software version. Customers without contracts may
>    upgrade only within a single row of the table below, except that any
>    available fixed software will be provided to any customer who can use
>    it and for whom the standard fixed software is not yet available. As
>    always, customers may install only the feature sets they have
>    purchased.
>
>
+-------------------------------------+----------------------------------+
>    |                                     | Fixed Regular Release available
|
>    | Version Affected                    | now; fix will carry forward
into |
>    |                                     | all later releases
|
>
+-------------------------------------+----------------------------------+
>    | All versions of Cisco Secure PIX up |
|
>    | to version 4.4(5) (including 2.7,   | 4.4(6)
|
>    | 3.0, 3.1, 4.0, 4.1)                 |
|
>
+-------------------------------------+----------------------------------+
>    | Version 5.0.x up to and including   |
|
>    | version 5.0(3)                      | 5.1(3)
|
>
+-------------------------------------+----------------------------------+
>    | All 5.1.x up to and including       |
|
>    | version 5.1(2)*                     | 5.1(3)
|
>
+-------------------------------------+----------------------------------+
>    | Version 5.2(1)                      | 5.2(2)
|
>
+-------------------------------------+----------------------------------+
>
>    *For customers who may have engineering releases addressing specific
>    unrelated defects, designated as 5.1(2)2xx, version 5.1(3) only
>    includes the SMTP security fixes and does not include any other
>    bugfixes. Customers requiring engineering releases to address specific
>    unrelated defects will need to use 5.1(2)207 or higher, which also
>    includes the SMTP security fixes.
>
>    Customers with contracts should obtain upgraded software through their
>    regular update channels. For most customers, this means that upgrades
>    should be obtained via the Software Center on Cisco's Worldwide Web
>    site at http://www.cisco.com.
>
>    Customers without contracts should get their upgrades by contacting
>    the Cisco Technical Assistance Center (TAC). TAC contacts are as
>    follows:
>      * +1 800 553 2447 (toll-free from within North America)
>      * +1 408 526 7209 (toll call from anywhere in the world)
>      * e-mail: [EMAIL PROTECTED]
>
>    Give the URL of this notice as evidence of your entitlement to a free
>    upgrade. Free upgrades for non-contract customers must be requested
>    through the TAC. Please do not contact either "[EMAIL PROTECTED]" or
>    "[EMAIL PROTECTED]" for software upgrades.
>
> Workarounds
>
>    There is not a direct work around for this vulnerability.  The
>    potential for exploitation can be lessened by ensuring that mail
>    servers are secured without relying on the PIX functionality.
>
> Exploitation and Public Announcements
>
>    This vulnerability was first reported to Cisco by a customer.  This
>    vulnerability has been discussed on public forums.
>
> Status of This Notice: FINAL
>
>    This is a final field notice. Although Cisco cannot guarantee the
>    accuracy of all statements in this notice, all of the facts have been
>    checked to the best of our ability.   Cisco does not anticipate
>    issuing updated versions of this notice unless there is some material
>    change in the facts. Should there be a significant change in the
>    facts, Cisco may update this notice.
>
> Distribution
>
>    This notice will be posted on Cisco's Worldwide Web site at
>    http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml.
>    In addition to Worldwide Web posting, a text version of this notice is
>    clear-signed with the Cisco PSIRT PGP key and is posted to the
>    following e-mail and Usenet news recipients:
>      * [EMAIL PROTECTED]
>      * [EMAIL PROTECTED]
>      * [EMAIL PROTECTED] (includes CERT/CC)
>      * [EMAIL PROTECTED]
>      * comp.dcom.sys.cisco
>      * [EMAIL PROTECTED]
>      * Various internal Cisco mailing lists
>
>    Future updates of this notice, if any, will be placed on Cisco's
>    Worldwide Web server, but may or may not be actively announced on
>    mailing lists or newsgroups. Users concerned about this problem are
>    encouraged to check the URL given above for any updates.
>
> Revision History
>
>    Revision 1.0  27-SEP-2000  Initial Public Release
>
> Cisco Security Procedures
>
>    Complete information on reporting security vulnerabilities in Cisco
>    products, obtaining assistance with security incidents, and
>    registering to receive security information from Cisco, is available
>    on Cisco's Worldwide Web site at
>    http://www.cisco.com/warp/public/707/sec_incident_response.shtml. This
>    includes instructions for press inquiries regarding Cisco security
>    notices.
>      _________________________________________________________________
>
>    This notice is copyright 2000 by Cisco Systems, Inc. This notice may
>    be redistributed freely after the release date given at the top of the
>    text, provided that redistributed copies are complete and unmodified,
>    including all date and version information.
>      _________________________________________________________________
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 6.0.2
>
> iQEVAwUBOdIIyGiN3BRdFxkbAQHiywf/XHl33Gn0t0kMW4jgeW+Ot7pHrj5m3aBX
> MbmVFClTUVXgA58daIH6H0PB4O5J/Qo7c6l5UH0POq1Hjd9Kog0pgDwdNomki70r
> QNvrlqrE3SmYtMz2OxltBQBq9mojM5/sVhdoEh/LNk693hOAYOjyrCR2Ml+avUjK
> IjhuMYXhoTnK5ytx/hvRmCLoqNw+GkcO885On0I0E5dQHzMWgtI3v4XGpXeWIr1R
> X2fMY0wwWDcfgXQQ6OkspuHcs412ukgo6hmxfEiFYVwFCiiRO7zX8tLKU5Hcc1t0
> UNVsXkjPZ+sOkJxXGd4Ov7nN+DAdTrHhuJIFY5yG4ate9diT615yGQ==
> =bZMO
> -----END PGP SIGNATURE-----
>

Responder a