Cisco PIX Firewall SMTP Command Restriction Bypass Vulnerability
The Cisco PIX Firewall implements technology that reads the contents of packets passing through it for application-level filtering. In the case of SMTP, it can be configured so only certain smtp commands can be allowed through. However, due to flaws in exceptional condition handling of PIX, it is reportedly possible to evade the smtp command restrictions by tricking the firewall into thinking the body of the message is being sent when it isn't. During communication with an smtp server, if the 'data' command is sent before the more important information is sent, such as 'rcpt to', the smtp server will return error 503, saying that rcpt was required. The firewall, however, thinks everything is alright and will let everything through until recieving '<CR><LF><CR><LF>.<CR><LF>'. It is then possible for the attacker to do whatever he wishes on the email server.