exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

NetGearFM114P.txt

NetGearFM114P.txt
Posted Sep 9, 2002
Authored by Marc Ruef | Site computec.ch

The NetGear FM114P is a hub, printer server, wireless access point, firewall and IDS. The firewalling module also supports filtering for domain names. This product does not resolve host and domain names by default. Due to this flaw, a user may access a site by entering the IP address instead of the host and domain name.

SHA-256 | 32ca50d10f76c08a1a6d948fd7845c7297eb3670d18b188200d7cb02da0cb701

NetGearFM114P.txt

Change Mirror Download
Hi!

The NetGear FM114P is a hub, printer server, wireless access point,
firewall and IDS. The firewalling module also supports filtering for
domain names (e.g. "www.computec.ch").

There is the same problem like described in
http://online.securityfocus.com/bid/5629 - The NetGear FM114P does not
resolve host and domain names by default. Due to this flaw, a user may
access a site by entering the IP address instead of the host and domain
name. http://www.computec.ch/software/firewalling/url_filtering-tunnel/
explains the problem in german and provides a possible exploit.

A possible workaround is to add the ip address(es) of the forbidden
hostname in the blacklist (e.g. "195.65.88.12"). But don't forget that
some smart attackers could use dotless ip addresses (e.g.
"http://3275839500"). And you'll got some problems with virtual hosting
webservers. Also, every additional filter entry will slow down the
FM114P.

The vulnerability has been tested on NetGear FM114P firmware Version 1.0
(default) and firmware Version 1.3 Release 04. I've informed the vendor
on 02/09/05 with an email to support@netgear.com - The following message
came back two days later (very nice responding time):

> You've probably already noticed that the router is not designed to block
> sites by IP address -- only by keyword -- This is *not* a vulnerability,
> just not something the router was designed to do -- Taken from the
> FM114P Reference Manual: "Content Filtering
> With its content filtering feature, the NETGEAR ProSafe Firewall
> prevents objectionable content from reaching your PCs. The firewall
> allows you to control access to Internet content by screening for
> keywords within Web addresses. You can configure the firewall to log and
> report attempts to
> access objectional Internet sites.Content Filtering
> With its content filtering feature, the NETGEAR ProSafe Firewall
> prevents objectionable content from reaching your PCs. The firewall
> allows you to control access to Internet content by screening for
> keywords within Web addresses. You can configure the firewall to log and
> report attempts to
> access objectional Internet sites."
>
> "The NETGEAR ProSafe Firewall allows you to restrict access based on Web
> addresses and Web address keywords. Up to 255 entries are supported in
> the Keyword list. The Keyword Blocking menu is shown in Figure 5-2:"
>
> As for IP address blocking being added to future firmware revisions,
> you'll be able to request it at this link (which will be read by
> Netgear's Engineers) --
> http://www.expressresponse.com/netgear1/feedbackmenu.html

Everyone can say that software has "no vulnerabilities", just "missing
features". I've filled this form with my feature and security
suggestions and hope that they'll fix the flaw in an upcoming firmware
update...

Bye, Marc

--
Computer, Technik und Security
http://www.computec.ch
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close