[NEWS] D-Link Router UPNP Stack Overflow
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 2 Aug 2006 16:23:57 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
D-Link Router UPNP Stack Overflow
A remote stack overflow exists in a range of wired and wireless D-Link
routers. This vulnerability allows an attacker to execute privileged code
on an affected device. When a specific request is sent to an affected
device, a traditional stack overflow is triggered allowing an attacker
complete control of the router. With the ability to execute code on the
device, it is then possible to apply modified firmware, and ultimately
compromise the entire network.
The Universal Plug and Play (uPnP) stack on many D-Link devices is
vulnerable to a traditional remote stack overflow. This vulnerability
exists on the Local Area Network (LAN) interface of affected D-Link
devices. Due to the ease in which one can gain access to the LAN interface
of wireless devices, this attack is remote in nature.
* DI-524 Rev A
* DI-524 Rev C
* DI-524 Rev D
* DI-604 Rev E
* DI-624 Rev C
* DI-624 Rev D
* DI-784 Rev A
* EBR-2310 Rev A
* WBR-1310 Rev A
* WBR-2310 Rev A
The vulnerability exists within the M-SEARCH function. By issuing an
M-SEARCH request with an overly long parameter (approximately 800 bytes),
a stack overflow is triggered and an attacker can reliably execute code of
his/her choosing. This can be accomplished without affecting network
connectivity and without any signs of exploitation. In some exploitation
cases, the payload may require a soft-reset on the device, interrupting
connectivity for a brief moment.
The following request to UDP port 1900 will trigger the stack overflow:
M-SEARCH <800 byte string> HTTP/1.0
Information on exploiting vulnerabilities within embedded systems is
scarce. To successfully debug hardware devices you will generally require
external hardware for the debugging interface.
D-Link has released updates for all affected routers and they are
available for download from the D-Link website.
The information has been provided by <mailto:Advisories@xxxxxxxx> eEye
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [UNIX] TSEP copyright File Inclusion
- Next by Date: [TOOL] AxMan - Web-Based ActiveX Fuzzing Engine
- Previous by thread: [UNIX] TSEP copyright File Inclusion
- Next by thread: [TOOL] AxMan - Web-Based ActiveX Fuzzing Engine