Bugtraq mailing list archives
Phenoelit Advisory 0815 ++ -- Brick
From: kim0 <kim0 () phenoelit de>
Date: Sat, 27 Jul 2002 12:17:45 +0200
--
kim0 <kim0 () phenoelit de>
Phenoelit (http://www.phenoelit.de)
90C0 969C EC71 01DC 36A0 FBEF 2D72 33C0 77FC CD42
Phenoelit Advisory <wir-haben-auch-mal-was-gefunden #0815 ++->
[ Authors ]
FX <fx () phenoelit de>
kim0 <kim0 () phenoelit de>
Phenoelit Group (http://www.phenoelit.de)
http://www.phenoelit.de/stuff/Lucent_Brick.txt
[ Affected Products ]
Lucent
LSMS 5.5 (Lucent Brick, Bridging VPN Firewall)
Lucent Bug ID: Not assigned
[ Vendor communication ]
06/28/02 Reply to inquiry regarding "who to notify"
06/29/02 Initial Notification to Brick team
*Note-Initial notification by phenoelit
includes a cc to cert () cert org by default
07/02/02 Ack. of receipt by Lucent Brick team
07/06/02 Weekly follow-up by central POC at
Lucent (Right on Time)
07/08/02 Additional tech-discussions
07/19/02 Notification of intent to post publically
in apx. 7 days.
07/25/02 Notification that due to personnel changes at Lucent,
our POC has changed. The new person is supposed to be
contacting us...
[ Overview ]
The Lucent Brick VPN Firewall is a layer 2, NCSA, US Army, and
US National Security Agency (NSA) Approved/Certified Firewall that
operates on Inferno, an Embdedded Operating System. "Brick" devices
come in many sizes from the SOHO Brick 20 to the Enterprise 1000(GiG).
[ Description ]
The Brick suffers from several design failures in handling of the ARP
protocol.
1. It is possible to interrupt any connection between the Brick and
critical devices such as the LSMS (Brick Management Server) by
binding the IP Address of the device in question to the attackers
interface and "pinging" the Brick or any address behind it. The Brick
will immediately update its ARP cache and drop the connection, no matter
where the attacker is located (internal/outside segment). This
requires the "Floating MAC" setting to be turned on.
2. The Brick will forward any ARP request and response across all
interfaces, regardless of the existing firewall rules.
3. All Bricks are identifiable during reconnaissance using the most
basic of techniques (pinging all addresses in segment). The device
that sends ARP requests for the attacker IP address is the Brick.
[ Example ]
1. # man ping
2. # man arp
3. # for i in ´cat ipaddresses.txt´; do ping $i; done
[ Solution ]
None known at this time.
[ end of file ]
Current thread:
- Phenoelit Advisory 0815 ++ -- Brick kim0 (Jul 27)
