VirusWall HTTP proxy content scanning circumvention

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

FOR PUBLIC RELEASE

- ------------------------------------------------------------------------
Inside Security GmbH Vulnerability Notification
Revision 0.3  2002-03-10
- ------------------------------------------------------------------------

The latest version of this document is available at
http://www.inside-security.de/vwall_cl0.html

A demo server and proof of concept code are available at
http://www.inside-security.de/vwall_cl0_poc.html

- -------------------------------------------------------------------------
Trend Micro InterScan VirusWall HTTP proxy content scanning circumvention
- -------------------------------------------------------------------------

Summary:
  Trend Micro InterScan VirusWall contains a HTTP proxy that prevents users
  from downloading virus-infected content by scanning the data received
  from a web server before passing it to the client. However, the default
  configuration of the HTTP proxy will cause it to skip content scanning if
  a malicious web server provides a modified HTTP header, thereby letting
  virus-infected content pass.

Impact:
  Users behind the VirusWall can unintentionally download virus-infected
  content from a malicious web server without being protected by the
  VirusWall.

Affected systems:
  Trend Micro InterScan VirusWall 3.6

Releases tested:
  Trend Micro InterScan VirusWall 3.6 for Red Hat Linux 6.2

Vendor status:
  The vendor was informed 2002/02/25 and replied that a major change in
  the software would be needed to fix this issue and agreed with our
  suggested workaround below adding the server timeout comment.

Detailed description:
  The Trend Micro InterScan VirusWall HTTP proxy contains a configuration
  option called "Skip scanning if Content-length equals 0". This option
  is enabled by default and only mentioned but not explained in the
  administrator's guide. It may be useful to prevent scanning of "empty"
  web pages. If this option is enabled and the proxy receives a document
  from a web server with real content, but which is preceded by a HTTP
  header with content-length field set to 0, it will pass the document
  to the client without scanning it. Of course, the web server must have
  been modified to return a zero content length field when serving a
  virus-infected document. This could e.g. have been done by a malicious
  webmaster or an intruder with the intent to trick users into downloading
  virus-infected content from his/her site. Unfortunately many web
  browsers e.g. Netscape 4.7, Netscape 6 and MSIE 6 will ignore the zero
  content-length field in the HTTP header and still download the document.

Proof of concept:
  A modified server to demonstrate the vulnerability and proof of concept
  source code are available at

  http://www.inside-security.de/vwall_cl0_poc.html

  The tests are done with the EICAR anti-virus test file, for more
  information about the anti-virus test file visit the European Institute
  for Computer Anti-Virus Research (EICAR) at http://www.eicar.org/

Suggested workaround:
  Disable the "Skip scanning if Content-length equals 0" option in the
  HTTP proxy configuration using the VirusWall web administration
  interface. When disabled certain sites may display slowly, in this
  case the "server timeout" value on the advanced configuration page
  should be configured to a smaller value.

Credits:
  This vulnerability was found and documented by Jochen Thomas Bauer
  <jtb@inside-security.de> and Boris Wesslowski <bw@inside-security.de> of
  Inside Security GmbH, Stuttgart, Germany.

- ------------------------------------------------------------------------
(C) 2002 Inside Security GmbH
This notice may be redistributed freely provided that redistributed copies
are complete and unmodified, and include all date and version information.

ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
INCLUDING ANY WARRANTY OF NON-INFRINGEMENT OR IMPLIED WARRANTY OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE HEREBY
DISCLAIMED AND EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW.

IN NO EVENT WILL INSIDE SECURITY GMBH BE LIABLE FOR ANY LOST REVENUE,
PROFIT OR DATA, OR FOR DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL,
INCIDENTAL OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF ANY
THEORY OF LIABILITY ARISING OUT OF THE USE OF OR INABILITY TO USE THE
INFORMATION CONTAINED IN THIS SECURITY BULLETIN, EVEN IF INSIDE
SECURITY GMBH HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

If any of the above provisions are held to be in violation of
applicable law, void, or unenforceable in any jurisdiction, then
such provisions are waived to the extent necessary for this disclaimer
to be otherwise enforceable in such jurisdiction.
- ------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)

iD8DBQE8jKGpjZjTvnUSw/YRAoeYAJ9Xn8chqRdXGs1cWoFrhw0qCrbGTwCdFn7d
CN6rvogObY5ug4/PowuS1pQ=
=RGX9
-----END PGP SIGNATURE-----

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux