Home page logo

bugtraq logo Bugtraq mailing list archives

Re: vulnerability in Symantec products
From: <jay.tomas () infosecguru com>
Date: Fri, 27 Oct 2006 15:32:49 -0400

Ummm are you for real? You are posting this as a vulnerability?

Chances are if they have trojaned or gained priviledged access to your workstation it shouldnt be
to much trouble to alter config of firewall or skirt outbound connectivity.

Unwise default config, perhaps. Vulnerability ... naah.


----- Original Message -----
From: security () dimichsoft com
To: bugtraq () securityfocus com
Sent: 26 Oct 2006 22:30:11 -0000
Subject: vulnerability in Symantec products

Critical vulnerability was discovered in Symantec Internet Security 2005, posible afected products:
Symantec Personal Firewall 2005, Symantec Internet Security 2004, Symantec Personal Firewall 2004, 
Symantec Personal Firewall 2003, Symantec Internet Security 2006, Symantec Personal Firewall 2006.

Defective program feature allows to establish remote connections undetected - thus creating a
perfect exploit for trojans and hacker activities. Symantec products generally have a rule "Default
outbound NetBIOS", allowing programs to establish direct IP connections on ports 137, 138, 139.
Therefore, trojan programs can undetectably bypass Symantec firewall and connect on these ports to
attacker's remote server. However, resolving IP from DNS will be detected by the firewall.

- Disable "Default outbound NetBIOS" rule
- Modify "Default outbound NetBIOS" rule and restrict connections only to LAN

DimichSoft Security Group

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]