Gauntlet Firewall Rules Bypass...

- AV AC AU C I A
发布: 1999-10-18
修订: 2025-04-13

It may be possible to violate all firewall rules if certain conditions are met when Gauntlet Firewall 5.0 is installed on the BSDI platform with a specific configuration. The following things need to happen in the order listed below for Gauntlet to be exploitable: 1) Install BSDI 3.1 2) Install Gauntlet 5.0 3) Install BSDI patch M310-049 4) Install Gauntlet 5.0 kernel patch level 2 5) Remove any proxy settings on client machine. 6) Set the default route on the client machine and attempt to connect to any host through a normal tcp connection. This problem surfaces when connections are made through any adaptive proxy, "old" proxy or no proxy at all. In order to exploit this, a route will need to be specified since NAT will not occur when data is sent through the affected firewall. None of the connections that ignore the rules are logged in /var/log/messages. Keith Young describes how to replicate the problem (this is taken directly from his bugtraq post): 1) Install BSDI 3.1, March...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息