COMMAND
Lockdown
SYSTEMS AFFECTED
Lockdown
PROBLEM
Sektor Kun found following. All machines running Lockdown
Corporation's Lockdown AntiTrojan program (ALL VERSIONS). Tested
under Windows98. Results may vary under different operating
systems, but all are vulnerable to the same problem.
Lockdowns main display textbox can only hold about 61,000 bytes
of text before it overloads. An attacker can easily overload the
program remotely. A single connection attempt on a trojan port
such as 1243 results in the following being added to the display:
[5/3/00 9:19:19 PM] Incoming hack attempt from IP Address: 10.0.0.10
[5/3/00 9:19:19 PM] Hacker is attempting to gain access using the SubSeven trojan on port 1243.
[5/3/00 9:19:19 PM] Hacker's connection was terminated by Lockdown 2000.
[5/3/00 9:19:19 PM] Log auto-saved to: 05032000.LOG
Almost 300 bytes are added to the main text display everytime
somebody connects to a trojan port (it monitors 12345 and 1243 by
default). This means it only takes 203 connection attempts to
overload the program - this is easily achieved in just a few
seconds using octopus.c - a program which launches continual
connections at a port).
When the overload occurs, two main internal errors start
displaying repeatedly:
Text exceeds memo capacity.
Cannot create file C:\PROGRAM FILES\LOCKDOWN 2000 V6.0\ldtr.bat
(ldtr.bat is simply a batch file to launch the DOS traceroute).
It's another burden that Lockdown shells to the DOS prompt to
perform traceroutes, because during the overload, dozens of
"Winoldap" processes start to collate in the process list,
consuming extra system resources. At this point, blue screens of
death started displaying repetitively, forcing the user to either
Reset or kill Lockdown (and the dozens of Winoldap processes).
Blue screen message:
A fatal exception 0E has occurred at 0028:C02C54E5 in VXD VCOND(03) +
00001745. The current application will be terminated.
After the overload occurs, no activity is recorded by Lockdown.
SOLUTION
None. Lockdown doesn't give the user the option of _not_ listening
on these ports, so if Lockdown is running, it is vulnerable.
According to Jeffrey Eaves and in the opinion of others (see
links), Lockdown2k is fraudulent in every respect; It is not a
firewall, proxy nor anything close to the real thing. You can
walk right past this "software" into a target machine and it will
not even notice. The "attack" messages it displays are randomly
generated to give the "impression" that it is working for you.
It does not listen directly to any port; it picks that information
up much later once a packet has been through the tcp/ip stack (and
done it's damage), and only then looks at a couple of well known
ports and forgets about the other 65,533 ports! It is really
quite an unbelievable effort to rip off the unsuspecting and
ignorant. The more people that know that this is bullshit, the
better.
Lockdown2k is nothing more than a rehash of the failed and
discredited product Hackerproof98.