Avirt Gateway vulnerabilities

Created 1/29/02
CAN 2002-0133
CAN 2002-0134

Impact

Multiple vulnerabilities could allow a remote attacker to execute arbitrary commands.

Background

The Avirt Soho, Gateway, and Gateway Suite products offer firewalls, proxy services, automatic client configuration, and other services which facilitate Internet sharing.

The Problems

Multiple vulnerabilities are present in Avirt products.

CAN 2002-0134
The first vulnerability is a buffer overflow in the processing of HTTP headers in Avirt's web proxy service. Remote attackers could exploit this condition to execute arbitrary commands. Avirt Soho, Gateway, and Gateway Suite version 4.2 and possibly earlier versions are affected by this vulnerability.

CAN 2002-0133
The second vulnerability affects the telnet proxy service. By connecting to the telnet service and issuing a ls or dir command, any remote user can view directory listings on the server. Furthermore, by simply entering dos, the remote user is presented with a DOS command prompt, thus gaining the ability to execute arbitrary commands. No login name or password is required to exploit these vulnerabilities. The Avirt Gateway Suite version 4.2 and possibly earlier versions are affected by this vulnerability. The Avirt Gateway product itself is not affected.

CAN 2002-0134
The third and final vulnerability also affects the telnet proxy service. A buffer overflow condition could allow any remote user to execute arbitrary commands by entering a long, specially crafted command at the telnet prompt. Avirt Gateway and Gateway Suite version 4.2 and possibly earlier versions are affected by this vulnerability.

Resolution

Install Avirt Soho, Gateway, or Gateway Suite version 4.3 or higher when it becomes available. Until then, it would be advisable to disable vulnerable services.

Where can I read more about this?

These vulnerabilities were reported in three separate Strumpf Noir Society Advisories: 1/17/2002, 1/17/2002, and 1/18/2002.