-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

          ESB-2004.0430 -- Symantec Security Bulletin - SYM04-010
   Symantec Gateway Security Products DNS Cache Poisoning Vulnerability
                               25 June 2004

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                Gateway Security 5400 Series, v2.0
                        Gateway Security 5300 Series, v1.0
                        Enterprise Firewall, v8.0
                        Enterprise Firewall, v7.0.x
                        VelociRaptor, Model 1100/1200/1300
                        VelociRaptor, Model 500/700/1000
Publisher:              Symantec
Operating System:       Solaris
                        Windows
Impact:                 Provide Misleading Information
Access Required:        Remote

- --------------------------BEGIN INCLUDED TEXT--------------------

Revision History: None

Risk Impact: Medium 


Overview

Symantec resolved a DNS cache poisoning vulnerability that was reported to
impact the Symantec Gateway Security products noted below. Under specific
conditions and configurations, incorrect or false DNS records could be
inserted into the DNS cache tables. It would then be possible that legitimate
DNS requests would return incorrect responses. 


Affected Components

Symantec Gateway Security 5400 Series, v2.0
Symantec Gateway Security 5300 Series, v1.0
Symantec Enterprise Firewall, v7.0.x (Windows and Solaris)
Symantec Enterprise Firewall v8.0 (Windows and Solaris)
Symantec VelociRaptor, Model 1100/1200/1300
Symantec VelociRaptor, Model 500/700/1000 


Details

Symantec Security Gateway products include a DNS proxy, DNSd, which can be
configured to function as a DNS server. Under specific conditions, DNSd may
be susceptible to DNS cache poisoning. DNS cache poisoning occurs when
incorrect or false DNS records are inserted into a DNS server's cache tables.
The results of inadvertent or intentional DNS cache poisoning can be
unintentional loss of service or potentially malicious activity. 


Symantec Response

Symantec released a hotfix to address this issue that provides additional
authentication and validation checks for each response directed to DNSd.

Symantec recommends customers apply the appropriate hotfix for their affected
product versions immediately to protect against this type of threat. Product
specific hotfixes are available via the Symantec Enterprise Support site
http://www.symantec.com/techsupp.

Symantec is not aware of any active attempts against or customer impact from
this issue. 


CVE

A CVE Candidate name has been requested from the Common Vulnerabilities and
Exposures (CVE) initiative for this issue. This advisory will be revised
accordingly upon receipt of the CVE Candidate name.

This is a candidate for inclusion in the CVE list (http://cve.mitre.org),
which standardizes names for security problems. 


Symantec Product Security Contact Information

Anyone with information on security issues with Symantec products should
contact symsecurity@symantec.com.

Symantec strongly recommends using encrypted email for reporting
vulnerability information to symsecurity@symantec.com. The SymSecurity PGP
key may be obtained here:

http://securityresponse.symantec.com/avcenter/security/publickey/SymSecurity.asc

- --------------------------------------------------------------------------------

Copyright (c) 2004 by Symantec Corp.
Permission to redistribute this alert electronically is granted as long as it
is not edited in any way unless authorized by Symantec Security Response.
Reprinting the whole or part of this alert in any medium other than
electronically requires permission from symsecurity@symantec.com.

Disclaimer
The information in the advisory is believed to be accurate at the time of
publishing based on currently available information. Use of the information
constitutes acceptance for use in an AS IS condition. There are no warranties
with regard to this information. Neither the author nor the publisher accepts
any liability for any direct, indirect, or consequential loss or damage
arising from use of, or reliance on, this information.

Symantec, Symantec products, Symantec Security Response, and SymSecurity are
registered trademarks of Symantec Corp. and/or affiliated companies in the
United States and other countries. All other registered and unregistered
trademarks represented in this document are the sole property of their
respective companies/owners.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQNuMrSh9+71yA2DNAQKOCAP/YmZNxVFpurcHDLwgJ1bSgcwlFkR037iW
I/w1rtXT49ORs759CV+GcuqrPDfnTFjepyb87q2kaNsAkzY7LLh7MX8WgQ0Un8kB
4SJxLOl7aj7OV9S6i7gw7/k46YHBFtVWlGXaCyldS6aSM5NmpBR8Se3PmskjQG4R
KZEvAg1D20s=
=F22l
-----END PGP SIGNATURE-----