[NEWS] Backdoor Menu on Conexant Chipset Dsl Router (Zoom X3)

From: SecuriTeam (support_at_securiteam.com)
Date: 07/08/04

  • Next message: SecuriTeam: "[UNIX] wvWare Library Buffer Overflow Vulnerability"
    To: list@securiteam.com
    Date: 8 Jul 2004 15:07:37 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Backdoor Menu on Conexant Chipset Dsl Router (Zoom X3)
    ------------------------------------------------------------------------

    SUMMARY

     <http://www.zoom.com/products/adsl_overview.html> Zoom ADSL modems
    "provide superior data rate transmission and extended reach, even over
    challenging line conditions". A vulnerability in the product leaves out an
    administrative port that is password protected by a default password (this
    default password cannot be changed).

    DETAILS

    Vulnerable Systems:
     * Zoom X3

    Telneting to port 254 gives you access to a menu, which identifies itself
    as "ATU-R ACCESS RUNNER ADSL TERMINAL (Annex A) 3.27", and uses the
    DEFAULT HTML management password, zoomadsl, even if you have changed it to
    something else. i.e. changing the HTML password does not change this one.
    From this menu you can change DSL settings and issue a complete "Factory
    Reset".

    Workaround:
    The workaround is to create dummy "Virtual Servers" on port TCP 254 this
    will block any incoming connections.

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:adam@algroup.co.uk> Adam
    Laurie.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[UNIX] wvWare Library Buffer Overflow Vulnerability"

    Relevant Pages

    • [UNIX] Solaris Socket Hijack Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... By binding a socket with an already binded port number of specific IP ... attackers can hijack an already binded sockets in Solaris. ... A bug with Solaris Kernel flag of SO_REUSEADDR cause the Kernel to accept ...
      (Securiteam)
    • [EXPL] Quake 3 Buffer Overflow (Exploit)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... port and exit cleanly with an unsuspicious error message. ... unsigned char ipx; ... int hooklen; // for both sendservercommand and directconnect ...
      (Securiteam)
    • [TOOL] IRC DCC Connect() Blind Port Scanner
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... IRC DCC ConnectBlind Port Scanner ... After waiting a short while for the mIRC client ...
      (Securiteam)
    • [NT] SLMail Pro Multiple Denial of Service
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The SLMail Pro Web Service running on port 801 is ... int main{ ...
      (Securiteam)
    • [EXPL] TCP Window Size RST
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... (IP addresses of the peers and port numbers). ... be used to reset any TCP connection once the range of sequence numbers is ... irssi's window size was larger so I figured ...
      (Securiteam)