ID

VAR-200905-0188


CVE

CVE-2009-1556


TITLE

Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control stack buffer overflow

Trust: 0.8

sources: CERT/CC: VU#639345

DESCRIPTION

img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507. The Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The Linksys WVC54GC wireless video camera insecurely sends initial configuration information over the network, which can allow a remote, unauthenticated attacker to intercept video streams, access wireless network authentication credentials, modify the device firmware, or cause a denial-of-service to the video camera. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to an information-disclosure vulnerability. Exploiting this issue can allow a remote attacker to harvest sensitive information such as the administrator's password, which can lead to a complete compromise of the device. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. The Linksys WVC54GCA management console does not properly filter the next_file parameter submitted by the main.cgi program, and remote attackers can retrieve the contents of the current directory by submitting malicious requests. If the contents of .htpasswd are retrieved, the user can perform arbitrary operations by logging into the console without authorization. ---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/ Stay Secure, Secunia ---------------------------------------------------------------------- TITLE: Linksys WVC54GCA Multiple Vulnerabilities SECUNIA ADVISORY ID: SA34767 VERIFY ADVISORY: http://secunia.com/advisories/34767/ DESCRIPTION: pagvac has reported some vulnerabilities in Linksys WVC54GCA, which can be exploited by malicious people to disclose sensitive information or conduct cross-site scripting attacks, and by malicious users to bypass certain security restrictions. 1) The device sends e.g. login credentials in plain text after receiving a specially crafted UDP packet. This can be exploited to read the .htpasswd file from the current directory and disclose the administrator's password. Successful exploitation of this vulnerability requires valid user credentials. 3) Input passed to the "next_file" parameter in img/main.cgi, main.cgi, and adm/file.cgi is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerabilities are reported in firmware versions 1.00R22 and 1.00R24. Other versions may also be affected. SOLUTION: Use the product in trusted networks only. Filter malicious characters and character sequences in a web proxy. PROVIDED AND/OR DISCOVERED BY: pagvac ORIGINAL ADVISORY: http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/ OTHER REFERENCES: SA33032: http://secunia.com/advisories/33032/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . 1) A security issue is caused due to the device sending certain information (e.g. This can be exploited to gain access to sensitive information by sending a specially crafted packet to a vulnerable device. 2) A vulnerability is caused due to a boundary error in the "SetSource()" method of the NetCamPlayerWeb11gv2 ActiveX control (NetCamPlayerWeb11gv2.ocx). This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into visiting a malicious website. SOLUTION: Update to version 1.25. PROVIDED AND/OR DISCOVERED BY: US-CERT credits Greg Linares, eEye

Trust: 3.6

sources: NVD: CVE-2009-1556 // CERT/CC: VU#639345 // CERT/CC: VU#528993 // JVNDB: JVNDB-2009-003390 // BID: 34629 // VULHUB: VHN-39002 // PACKETSTORM: 76983 // PACKETSTORM: 72709

IOT TAXONOMY

category:['camera device']sub_category:video camera

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:linksys a division of ciscomodel: - scope: - version: -

Trust: 1.6

vendor:ciscomodel:wvc54gcascope:eqversion:1.00r24

Trust: 1.6

vendor:ciscomodel:wvc54gcascope:eqversion:1.00r22

Trust: 1.6

vendor:ciscomodel:wvc54gcascope:eqversion:1.00r22 and 1.00r24

Trust: 0.8

vendor:linksysmodel:wvc54gca 1.00r24scope: - version: -

Trust: 0.3

vendor:linksysmodel:wvc54gca 1.00r22scope: - version: -

Trust: 0.3

sources: CERT/CC: VU#639345 // CERT/CC: VU#528993 // BID: 34629 // JVNDB: JVNDB-2009-003390 // CNNVD: CNNVD-200905-070 // NVD: CVE-2009-1556

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1556
value: LOW

Trust: 1.0

CARNEGIE MELLON: VU#639345
value: 2.73

Trust: 0.8

CARNEGIE MELLON: VU#528993
value: 1.59

Trust: 0.8

NVD: CVE-2009-1556
value: LOW

Trust: 0.8

CNNVD: CNNVD-200905-070
value: LOW

Trust: 0.6

VULHUB: VHN-39002
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2009-1556
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-39002
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#639345 // CERT/CC: VU#528993 // VULHUB: VHN-39002 // JVNDB: JVNDB-2009-003390 // CNNVD: CNNVD-200905-070 // NVD: CVE-2009-1556

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-39002 // JVNDB: JVNDB-2009-003390 // NVD: CVE-2009-1556

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200905-070

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200905-070

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-003390

PATCH

title:Top Pageurl:https://www.cisco.com/

Trust: 0.8

sources: JVNDB: JVNDB-2009-003390

EXTERNAL IDS

db:NVDid:CVE-2009-1556

Trust: 2.9

db:BIDid:34629

Trust: 2.0

db:SECUNIAid:34767

Trust: 1.8

db:VUPENid:ADV-2009-1173

Trust: 1.7

db:CERT/CCid:VU#639345

Trust: 0.9

db:CERT/CCid:VU#528993

Trust: 0.9

db:JVNDBid:JVNDB-2009-003390

Trust: 0.8

db:CNNVDid:CNNVD-200905-070

Trust: 0.6

db:SECUNIAid:33032

Trust: 0.2

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-39002

Trust: 0.1

db:PACKETSTORMid:76983

Trust: 0.1

db:PACKETSTORMid:72709

Trust: 0.1

sources: OTHER: None // CERT/CC: VU#639345 // CERT/CC: VU#528993 // VULHUB: VHN-39002 // BID: 34629 // JVNDB: JVNDB-2009-003390 // PACKETSTORM: 76983 // PACKETSTORM: 72709 // CNNVD: CNNVD-200905-070 // NVD: CVE-2009-1556

REFERENCES

url:http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/

Trust: 2.1

url:http://www.securityfocus.com/bid/34629

Trust: 1.7

url:http://secunia.com/advisories/34767

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1173

Trust: 1.7

url:about vulnerability notes

Trust: 1.6

url:contact us about this vulnerability

Trust: 1.6

url:provide a vendor statement

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1556

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1556

Trust: 0.8

url:http://www.linksysbycisco.com/us/en/products/wvc54gca

Trust: 0.3

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/advisories/33032/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/

Trust: 0.1

url:http://secunia.com/advisories/34767/

Trust: 0.1

url:http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/request_2008_report/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/528993

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/639345

Trust: 0.1

url:http://secunia.com/advisories/product/20682/

Trust: 0.1

sources: OTHER: None // CERT/CC: VU#639345 // CERT/CC: VU#528993 // VULHUB: VHN-39002 // BID: 34629 // JVNDB: JVNDB-2009-003390 // PACKETSTORM: 76983 // PACKETSTORM: 72709 // CNNVD: CNNVD-200905-070 // NVD: CVE-2009-1556

CREDITS

pagvac

Trust: 0.9

sources: BID: 34629 // CNNVD: CNNVD-200905-070

SOURCES

db:OTHERid: -
db:CERT/CCid:VU#639345
db:CERT/CCid:VU#528993
db:VULHUBid:VHN-39002
db:BIDid:34629
db:JVNDBid:JVNDB-2009-003390
db:PACKETSTORMid:76983
db:PACKETSTORMid:72709
db:CNNVDid:CNNVD-200905-070
db:NVDid:CVE-2009-1556

LAST UPDATE DATE

2025-04-10T21:39:30.578000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#639345date:2008-12-05T00:00:00
db:CERT/CCid:VU#528993date:2008-12-05T00:00:00
db:VULHUBid:VHN-39002date:2009-05-23T00:00:00
db:BIDid:34629date:2009-05-21T05:21:00
db:JVNDBid:JVNDB-2009-003390date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200905-070date:2009-05-23T00:00:00
db:NVDid:CVE-2009-1556date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#639345date:2008-12-05T00:00:00
db:CERT/CCid:VU#528993date:2008-12-05T00:00:00
db:VULHUBid:VHN-39002date:2009-05-06T00:00:00
db:BIDid:34629date:2009-04-20T00:00:00
db:JVNDBid:JVNDB-2009-003390date:2012-06-26T00:00:00
db:PACKETSTORMid:76983date:2009-04-27T15:17:22
db:PACKETSTORMid:72709date:2008-12-08T17:18:51
db:CNNVDid:CNNVD-200905-070date:2009-04-20T00:00:00
db:NVDid:CVE-2009-1556date:2009-05-06T16:30:00.593