Full Disclosure mailing list archives
AW: Vulnerability ZoneAlarm Pro 4.5.532.000
From: "Marko Rogge | German-Secure" <mr () german-secure de>
Date: Fri, 30 Jan 2004 19:19:25 +0100
Hi Mr. La Cour & Readers! You are missing one fact, which we didn't explicitly state, which is that the target system was connected through a normal DSL home user's connection with a bandwidth of 768 kb/s. So, yes, it is clear that the available bandwidth was exceeded in any case, with or without Zone Alarm. However, as our detailed test report shows, with Zone Alarm handling that bandwidth of a 768 kb/s stream of incoming UDP DoS packets, the Zone Alarm was already using close to 100% CPU on our high-end system, and became unresponsive, and this especially with tiny UDP packets to random ports apart from other attacks, so we clearly _have_ a performance flaw of Zone Alarm here. Marko Rogge / german-secure.de Mixter / Securityspecialist
|-----Ursprüngliche Nachricht----- |Von: John LaCour [mailto:jlacour () zonelabs com] |Gesendet: Donnerstag, 29. Januar 2004 22:07 |An: mr () german-secure de; full-disclosure () lists netsys com |Betreff: RE: [Full-Disclosure] Vulnerability ZoneAlarm Pro |4.5.532.000 |Vertraulichkeit: Persönlich | | |-----BEGIN PGP SIGNED MESSAGE----- |Hash: SHA1 | |Zone Labs response concerning a reported Denial of Service |vulnerability in ZoneAlarm Pro v4.5.532. | |Zone Labs is aware of a reported Denial of Service |vulnerability in ZoneAlarm Pro v4.5.532 as reported by Marko |Rogge of German-Secure on the Full-Disclosure mailing list |on January 28th. We first received this report on Tuesday |January 27th. | |Zone Labs has reviewed the test results presented by Mr. |Rogge and used a similar methodology to try and reproduce |his findings. We were unable to do so and, as a result, we |do not believe that Mr. Rogge's tests indicate that there |are any vulnerabilities in ZoneAlarm Pro or other Zone Labs |products. | |In our own testing, using similarly configured systems, we |do see an increase in CPU utilization at higher packet rates |- up to approximately 20%. However, in no cases does the |system become unresponsive. Additionally, the firewall |continues to perform its job of allowing or denying traffic |based on the configured policy. | |Zone Labs would also like to point out the connection speed of |55 Mbps in the test case reported is 50 to 500 times the |bandwidth available to a typical broadband user. In |real-world scenarios, a user's bandwidth would be exhausted |prior to the network traffic having a significant impact to |ZoneAlarm Pro. | |Additionally, Mr. Rogge and Mixter did not report the |results of the system when the ZoneAlarm firewall was not |present. At extreme data rates any system's performance |will be impaired by a denial of service attack regardless of |the presence of ZoneAlarm Pro. | |In summary, ZoneAlarm Pro users are not vulnerable to a |denial of service attack as a result of using ZoneAlarm Pro, |nor can a denial of service attack be used to circumvent |ZoneAlarm Pro's protection. | |Zone Labs takes security vulnerability issues very seriously |and welcomes the opportunity to work with the security community. |While we appreciate Mr. Rogge bringing the matter to our |attention, we ask that all security researchers contact us |on security () zonelabs com (as mentioned in all of our |security advisories), and that in accordance with industry |practice, we be given up to 7 days to respond before any |issues are disclosed publicly. In all cases, Zone Labs will |make every attempt possible to acknowledge the report within |48 hours. | |John LaCour |Zone Labs |Security Response Team Manager |security () zonelabs com | |-----BEGIN PGP SIGNATURE----- |Version: PGP 8.0.2 | |iQA/AwUBQBl2DqeZbSyAsADEEQImwACg/UWJ64y+IAgs1Nr5I8hTgHcAnzgAoLwu |/axIMKc6zI27IdW4DwrJXCQd |=IXFN |-----END PGP SIGNATURE----- |
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Vulnerability ZoneAlarm Pro 4.5.532.000 Marko Rogge | German-Secure (Jan 28)
- <Possible follow-ups>
- RE: Vulnerability ZoneAlarm Pro 4.5.532.000 John LaCour (Jan 29)
- AW: Vulnerability ZoneAlarm Pro 4.5.532.000 Marko Rogge | German-Secure (Jan 30)
