Home page logo
/

bugtraq logo Bugtraq mailing list archives

RE: Black ICE Ping Vulnerability Side Note
From: "Keith T. Morgan" <keith.morgan () terradon com>
Date: Wed, 6 Feb 2002 15:16:36 -0500

Verified.  I set BID (without ICE CAP) to it's paranoid setting, then did the following:

root () stonegate:/var/log# ping -f -s 65000 -c 4000 192.168.x.x
PING 192.168.x.x (192.168.x.x): 65000 data bytes
............................................................................................................................................
--- 192.168.x.x ping statistics ---
4310 packets transmitted, 4000 packets received, 7% packet loss
round-trip min/avg/max = 15.1/22.7/337.7 ms
root () stonegate:/var/log# telnet 192.168.x.x 5900
Trying 192.168.x.x...
Connected to 192.168.x.x.
Escape character is '^]'.
RFB 003.003


The system tray icon for BID switched to the blue eyeball shield with the red diagonal slash.  Service stopped.  I was 
able to connect to the VNC port.


-----Original Message-----
From: Stoic forty-four [mailto:stoic44 () yahoo com]
Sent: Wednesday, February 06, 2002 12:25 PM
To: bugtraq () securityfocus com
Subject: Black ICE Ping Vulnerability Side Note


When attempting to replicate the ping vulnerability
discovered by Matt Taylor a different outcome was
discovered. Rather than the large ping causing the
server to blue screen and/or hang the black ice
service was actually stopped thus allowing an intruder
to gain access to the host.

Testing consisted of Black ICE Agent version 3.1eaj
generated and deployed by ICE CAP version 3.1. The
agent was installed on a Dell 6450 running Windows
2000 SP2 and was running WinVNC 3.3 server in
application mode. The Black ICE agent generated was
set to use the Paranoid setting in order to prevent
any inbound connections. Using VNC viewer from my
dektop, I attempted to connect to the VNC server
running on the Dell and was blocked. I then issued the
command ping -l 65000 -t X.X.X.X, waited 5 seconds,
and attempted to connect to the VNC server again and
was successful. Upon connecting to the VNC server and
gaining access to the desktop, a Black ICE pop up
window appeared stating that the Black ICE service has
stopped would you like to start it? I chose to start
the service again which was successful but did not
disconnect my VNC session and as mentioned before did
not leave any logs in Black ICE showing anything had
occurred.

This information would more than likely affect
Enterpises that have deployed Black ICE agents and
have ICE CAP infrastructure deployed to manage them. I
would like to know if anyone else is able to replicate
this.

Brandon Young

__________________________________________________
Do You Yahoo!?
Send FREE Valentine eCards with Yahoo! Greetings!
http://greetings.yahoo.com


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]