what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

EEYE-dlink.txt

EEYE-dlink.txt
Posted Jul 20, 2006
Authored by Barnaby Jack | Site eeye.com

A remote stack overflow exists in a range of wired and wireless D-Link routers. This vulnerability allows an attacker to execute privileged code on an affected device. When a specific request is sent to an affected device, a traditional stack overflow is triggered allowing an attacker complete control of the router. With the ability to execute code on the device, it is then possible to apply modified firmware, and ultimately compromise the entire network.

tags | advisory, remote, overflow
SHA-256 | 25d882c6fb0ae5a475f5d6f2351d4ac9dc574a80eed93c6005f7c73dc6e35280

EEYE-dlink.txt

Change Mirror Download
D-Link Router UPNP Stack Overflow

Release Date:
July 13, 2006

Date Reported:
February 27, 2006

Patch Development Time (In Days):
136

Severity:
High (Remote Code Execution)

Vendor:
D-Link

Routers Affected:

DI-524 Rev A
DI-524 Rev C
DI-524 Rev D
DI-604 Rev E
DI-624 Rev C
DI-624 Rev D
DI-784 Rev A
EBR-2310 Rev A
WBR-1310 Rev A
WBR-2310 Rev A

Overview:

A remote stack overflow exists in a range of wired and wireless D-Link
routers. This vulnerability allows an attacker to execute privileged
code on an affected device. When a specific request is sent to an
affected device, a traditional stack overflow is triggered allowing an
attacker complete control of the router. With the ability to execute
code on the device, it is then possible to apply modified firmware, and
ultimately compromise the entire network.

The Universal Plug and Play (uPnP) stack on many D-Link devices is
vulnerable to a traditional remote stack overflow. This vulnerability
exists on the Local Area Network (LAN) interface of affected D-Link
devices. Due to the ease in which one can gain access to the LAN
interface of wireless devices, this attack is remote in nature.

Technical Details:

The vulnerability exists within the M-SEARCH function. By issuing an
M-SEARCH request with an overly long parameter (approximately 800
bytes), a stack overflow is triggered and an attacker can reliably
execute code of his/her choosing. This can be accomplished without
affecting network connectivity and without any signs of exploitation.
In some exploitation cases, the payload may require a soft-reset on the
device, interrupting connectivity for a brief moment.

The following request to UDP port 1900 will trigger the stack overflow:

M-SEARCH <800 byte string> HTTP/1.0

Information on exploiting vulnerabilities within embedded systems is
scarce. To successfully debug hardware devices you will generally
require external hardware for the debugging interface.

I will be giving a presentation at SyScan '06 (http://www.syscan.org)
that will demonstrate exactly how to analyze, debug, and exploit
embedded devices.

A previous lecture demonstrates the compromise of a network via an
exploitable router, these slides are available for download from:

http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Jack.pdf

Vendor Status:

D-Link has released updates for all affected routers and they are
available for download from the D-Link website. (http://www.dlink.com)

Credit:
Barnaby Jack

Greetings:

B-boys and Fly-girls

Copyright (c) 1998-2006 eEye Digital Security
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express
consent of eEye. If you wish to reprint the whole or any part of this
alert in any other medium excluding electronic medium, please email
alert@eEye.com for permission.

Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are no warranties, implied or express, with regard to this information.
In no event shall the author be liable for any direct or indirect
damages whatsoever arising out of or in connection with the use or
spread of this information. Any use of this information is at the user's
own risk.
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close