COMMAND
Borderware Firewall predictable initial TCP sequence numbers
SYSTEMS AFFECTED
Systems running Borderware Firewalls v4 and v5
PROBLEM
Roy Hills found following while performing an Internet security
scan (aka penetration test). He discovered that version 5 of
Borderware Firewall generates predictable initial TCP sequence
numbers in response to incoming SYNs. The observed pattern is the
familiar "64k increments" often seen on older Unix kernels. This
allows TCP connections to be established with a spoofed source
address.
This has been seen on Borderware 5, but one may suspect that
this is a generic Kernel issue that would affect previous versions
as well. Tests indicate that both version 4 and version 5 of
Borderware are vulnerable to this issue.
SOLUTION
After being informed of this issue, Borderware Technologies, Inc.
have reproduced the problem and plan to address it in the next
release. As long as Borderware doesn't use source IP address for
authentication, then this is probably not a serious issue.
However, it would be possible to send "perfectly spoofed" Email -
complete with fake connecting IP address using a spoofed SMTP
session...