Hi all,
Any info about Firestorm bug and Fortigate Firewall ??
[link]http://www.bugsec.com/news/firestorm/[/link]
Regards,
HA
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I heard of no CVEs pertaining to this but my understanding of this issue(s) is that a SYN packet or SYN-ACK are being used to funnel data to the client+server. So to mitigated this you should never allow data within a SYN or SYN+ACK packet. ( why would we send before we have a established session )
You can write a simple rule to block this, this vulnerability btw has NOTHING todo with NGFW it's been around for decades. What I believe has happen is that the underworld is not exporting this in todays attacks.
see my blog on how to write a IPS rule to block payload in a SYN or SYN+ACK.
http://socpuppet.blogspot.com/2013/01/writing-ips-rules-fortinet-style.html
Go down half way and review the data size option. I've used scapy in a few past lives with exposing this many years ago.
enjoy
Ken
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1709 | |
1093 | |
752 | |
446 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.