Project

General

Profile

Actions

Bug #18970

closed

Symantec Client Firewall reports HTTP MS IE Object Element Data DoS attack and blocks

Added by Wolfgang Endhammer over 16 years ago. Updated over 16 years ago.

Status:
Closed
Priority:
Should have
Assignee:
-
Category:
-
Target version:
-
Start date:
2008-06-17
Due date:
% Done:

0%

Estimated time:
TYPO3 Version:
4.2
PHP Version:
5.2
Tags:
Complexity:
Is Regression:
Sprint Focus:

Description

Since Version 4.2.0 Symantec Client Friewall reports HTTP MS IE Object Element Data DoS attack and blocks Webaddress for 30 minutes

The Symantec Error Report is:

HTTP MS IE Object Element Data DoS
Severity: Medium

This attack could pose a moderate security threat. It does not require immediate action.

Description

This signature detects attempts to exploit a vulnerability in Microsoft Internet Explorer which allows an attacker to issue a denial of service attack on the victim host Internet Explorer Web browser.

Additional Information

A denial of service vulnerability has been reported in Microsoft Internet Explorer. This vulnerability is related to how the browser interprets properties of Object elements. The Object element is normally used to specify an external object to invoke such as an ActiveX component, Applet, etc.

This condition may occur when a malicious web page specifies an Object element with a data property that has a value of "?" or "#" in addition to specifying a type property that refers to an image type (such as "image/gif"). The vulnerability will reportedly cause the browser to crash due to an infinite loop.

Affected:

Microsoft Internet Explorer 6.0, 6.0 SP1

Response

Upgrade to the latest version of Microsoft Internet Explorer and apply all available patches.

Possible False Positives

There are no known conditions for false positives associated with this signature.

(issue imported from #M8733)


Files

typo3.pcap (754 KB) typo3.pcap Administrator Admin, 2008-06-17 23:11
test_with internet.pcap (197 KB) test_with internet.pcap Administrator Admin, 2008-06-19 09:09
server_firewall_off.pcap (185 KB) server_firewall_off.pcap Administrator Admin, 2008-06-19 09:10
client_firewall_off.pcap (183 KB) client_firewall_off.pcap Administrator Admin, 2008-06-19 09:10
Actions #1

Updated by Wolfgang Endhammer over 16 years ago

This problem exists when you update Frontend User profile and when you use extention mm_forum administration in the backend

Actions #2

Updated by Wolfgang Endhammer over 16 years ago

I also checked with IE7 - same Problem because not IE is the reason for the reaction of sysmantec Client firewall.
The reason is Symantec Client firewall detects the attack by itself and then blocks.

Actions #3

Updated by Marcus Krause over 16 years ago

As this is the TYPO3 bugtracker, what would be a solution/suggestion in your opinion?

Actions #4

Updated by Wolfgang Endhammer over 16 years ago

In my opinion there is something wrong in the php-scripts of the backend so the firewall detect this as an intrusion attack when the packets will be transfered from Client to the webserver and also in the other way. So I think this must be a special combination of printable or not printable characters.

next is the intrusion message of the firewall

Attempted Intrusion "HTTP MS IE Object Element Data DoS" against your machine was detected and blocked.
Intruder: localhost(http(80)).
Risk Level: Medium.
Protocol: TCP.
Attacked IP: localhost.
Attacked Port: 1711.

you see this problem exists also when I use to the localhost. And this problem could be a security hole when symantec defines this as

HTTP MS IE Object Element Data DoS intrusion

Symantec defines this like you see in my first message. I think this is a problem for many users using typo3 al over the world because symantec is one of the biggest provider for client firewalls.

I think this should be corrected by changing typo3 code.

Actions #5

Updated by Marcus Krause over 16 years ago

This Symantec filter was probably introduced due to a IE6 vulnerability back in 2004 (at least Symantec lists it as reference for this error message).
Error-Description: http://www.symantec.com/avcenter/attack_sigs/s21422.html
Vulnerability: http://www.securityfocus.com/bid/10167/info

"A denial of service vulnerability has been reported in Microsoft Internet Explorer. This condition may occur when a malicious web page specifies an Object element with a data property that has a value of "?" or "#" in addition to specifying a type property that refers to an image type. The vulnerability will reportedly cause the browser to crash."

Wolgang, could you log your traffic and provide a http/tcp capture log of this exactely moment when Symantec fires up this message.

Actions #6

Updated by Wolfgang Endhammer over 16 years ago

I have captured the traffic with wireshark. Enclosed you will find the capture file. Following actions where be done in this few seconds:

1. Open one record of an Frontend-user
2. No change
3. save the record with the button "save and close"

I hope this capture file will help you. The symantec client firewall found 20 attacks and then blocked.

Best regards
Wolfgang

Actions #7

Updated by Marcus Krause over 16 years ago

One quick advice: You should immediately change the password of FE-User Agatha because the according password is within the provided capture.

Actions #8

Updated by Marcus Krause over 16 years ago

Unfortunately there's no POST-request within the capture. I would at least expect one such request.

Actions #9

Updated by Wolfgang Endhammer over 16 years ago

password is changed. Today I will try to do 2 another capture one on client side and one on server side (testserver). But it will take a little bit time to activate this testserver.

Best regards
Wolfgang

Actions #10

Updated by Wolfgang Endhammer over 16 years ago

Srry I'm a little bit late, but I had no connection to internet.

Now there are 3 captures. One capture (test with internet) I tested again the connection to www.megatreff.at with another system. Same troubles when try to start edit of Frontend-user or finish with save & close.

The other 2 captures are done when the firewall is switched of between testserver and client

There is one more question:
Why do you lock for a POST message. There are many GET messages. Is'nt it possible that one GET messages are the reason the firewall blocks?

Best regards
Wolfgang

Actions #11

Updated by Marcus Krause over 16 years ago

Why do you lock for a POST message.

You said ealier:

This problem exists when you update Frontend User profile

That's why I think your firewall blocks this specific POST request!

Actions #12

Updated by Wolfgang Endhammer over 16 years ago

please apologize my inaccurate description. The messages from the firewall start when I open the editform for the frontenduser.

Best regards
Wolfgang

Actions #13

Updated by Wolfgang Endhammer over 16 years ago

This case is open. Please tell me who will have a look on this case. I think it should be interesting for the typo3 developer group, if symantec client firewall actual version have problems with parts of the typo3 backend.
I am sure this affects many users all over the world.

Best regards
wolfgang

Actions #14

Updated by Dmitry Dulepov over 16 years ago

I think Symantec should be notified. Symantec is the only one who gives false alarams. Why would TYPO3 fix it for Symantec? Fail ticket to them.

Actions #15

Updated by Wolfgang Endhammer over 16 years ago

You are right, but symantec was informed and I were told, Symantec Client firewall does'nt have a bug. The messages between client and server will be identified to be a potential risk. So the Symantec client firewall is working correct.

Best regards
Wolfgang

Actions #16

Updated by Marcus Krause over 16 years ago

I discussed this issue with Ingo (Renner) about two months ago. We decided that we won't take any steps to solve this "issue". It's obvious kind of a false positive by Symantec which tries to prevent exploits of a quite old vulnerability (2004) in IE6.
In between, it's all water under the bridge and your IE6 should either be patched or even IE7 is installed.
It's up to Symantec to fix this but probably they don't care either.

Actions #17

Updated by Marcus Krause over 16 years ago

This isn't considered to be a TYPO3 problem!

Actions

Also available in: Atom PDF