what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

031003.txt

031003.txt
Posted Feb 9, 2004
Authored by Bruno Morisson | Site genhex.org

The Red-M RedAlert wireless 802.11b/Bluetooth probe version 2.75 has multiple security issues. Any unauthenticated user can reboot the appliance through the webserver. The administrator's access is bound by IP address, allowing anyone coming in via NAT from a shared network the same levels of control. The device also filters out specific characters in SSIDs representing them all as a single space character.

tags | advisory
SHA-256 | 71f2e6720e463278dc0da49ea24319c0a4bc4ce61c86960afea7ce164e6958ce

031003.txt

Change Mirror Download

Red-M Red-Alert Multiple Vulnerabilities

Product: RedAlert
Versions Affected: Tested with hardware version 2.7.5, software v3.1 build 24
Status: Fixed by vendor
Vendor URL: http://www.red-m.com
Advisory URL: http://genhex.org/releases/031003.txt
Author: Bruno Morisson <morisson@genhex.org>

Timeline:
3 October 2003 - Vendor contacted through local partner
8 January 2004 - New firmware version tested
8 February 2004 - Advisory released

Copyright notice:
This advisory, parts of it, or of the information herein
can be reproduced as long as proper credit is given to the author(s).

Product Description:
Red-Alert is a wireless (802.11b/Bluetooth) probe that monitors and
reports on wireless security threats.


Overview:
1) Any unauthenticated user can remotely reboot the Red-Alert probe, and
all locally logged events are lost.
2) The user authentication is bound to the source IP address
of the user authenticating, hence any other user behind the same address
will not be asked for authentication.
3) The probe will not correctly identify SSID strings that contain multiple
space (0x20) characters.


Details:
1) Any unauthenticated user can remotely reboot the Red-Alert
appliance through the webserver.
When a browser request is longer than aproximately 1230 bytes, the
appliance simply reboots. Consequently, all information is lost.
*Anything* sent to the device's tcp port 80 longer than aprox.
1230 bytes reboots it, whether it's a valid request or not.

This can be tested, for example, using perl and netcat:
$ perl -e 'print "a"x1230 . "\r\n\r\n"| nc <device ip> 80

The device reboots, and all locally logged information is lost.

2) The authentication of the probe administrator is bound to the user's
IP address. If multiple users are behind a nat or proxy, any of
those users can access the gui without restrictions after authentication.
The authentication does, in fact, expire after a few minutes of
inactivity, however, since the events popup page auto-refreshes itself
the session will potentially never expire.

3) If there are wireless networks detected by the probe with an SSID
with multiple space (0x20) characters, the probe fails to correctly
identify them. For example, if a network has the SSID " ",
the probe will detect it as " "(single space character). Any sequence
of multiple space characters in any substring of the SSID are
represented as one single space character.


Solution:
Contact Red-M or your local partner for a firmware update.


Disclaimer:
The information in this advisory is provided AS IS, with no
guarantee that its contents are correct, although the author
believes them to be so. The author takes no responsability for
the use or misuse of the information in this advisory or methods
described. Use at your own responsability.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close