ID

VAR-201111-0137


CVE

CVE-2011-3992


TITLE

Multiple D-Link products vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2011-000092

DESCRIPTION

Buffer overflow in the SSH server functionality on the D-Link DES-3800 with firmware before 4.50B052, DWL-2100AP with firmware before 2.50RC548, and DWL-3200AP with firmware before 2.55RC549 allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors. Multiple D-Link products contain a buffer overflow vulnerability. Multiple D-Link products contain a buffer overflow vulnerability due to a SSH implementation issue. Hisashi Kojima, Masahiro Nakada of Fujitsu Laboratories Ltd. reported this vulnerability to IPA. The problem exists in the SSH server provided by the device. Unexplained security vulnerabilities allow remote attackers to perform buffer overflow attacks. Successful exploitation of a vulnerability can execute arbitrary code in the context of an application. Very few details are available regarding this issue. We will update this BID when more information emerges. Failed exploit attempts will likely result in a denial-of-service condition. The issue affects the following: D-Link DES-3800 firmware prior to R4.50B052 D-Link DWL-2100AP firmware prior to 2.50RC548 D-Link DWL-3200AP firmware prior to 2.55RC549. D-Link is a network company founded by Taiwan D-Link Group, dedicated to the R&D, production and marketing of LAN, broadband network, wireless network, voice network and related network equipment. ---------------------------------------------------------------------- Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool. Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/ ---------------------------------------------------------------------- TITLE: D-Link Products SSH Server Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA46637 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46637/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46637 RELEASE DATE: 2011-10-29 DISCUSS ADVISORY: http://secunia.com/advisories/46637/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46637/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46637 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in multiple D-Link products, which can be exploited by malicious people to compromise a vulnerable device. SOLUTION: Update to fixed firmware (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: JVN credits Hisashi Kojima, and Masahiro Nakada, Fujitsu Laboratories Ltd. ORIGINAL ADVISORY: D-Link (DL-VU2011-001): http://www.dlink-jp.com/page/sc/F/security_info20111028.html JVN: http://jvn.jp/en/jp/JVN72640744/index.html http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000092.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2011-3992 // JVNDB: JVNDB-2011-000092 // CNVD: CNVD-2011-4566 // BID: 50405 // VULHUB: VHN-51937 // PACKETSTORM: 106360

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-4566

AFFECTED PRODUCTS

vendor:dlinkmodel:dwl-3200apscope:lteversion:2.55

Trust: 1.0

vendor:dlinkmodel:des-3800scope:eqversion:*

Trust: 1.0

vendor:dlinkmodel:des-3800scope:lteversion:4.50

Trust: 1.0

vendor:dlinkmodel:dwl-3200apscope:eqversion:2.40

Trust: 1.0

vendor:dlinkmodel:des-3800scope:eqversion:4.00

Trust: 1.0

vendor:dlinkmodel:dwl-2100apscope:lteversion:2.50

Trust: 1.0

vendor:dlinkmodel:dwl-3200apscope:eqversion:*

Trust: 1.0

vendor:dlinkmodel:dwl-2100apscope:eqversion:*

Trust: 1.0

vendor:d linkmodel:des-3800scope:eqversion:series firmware prior to r4.50b052

Trust: 0.8

vendor:d linkmodel:dwl-2100apscope:eqversion:firmware prior to 2.50rc548

Trust: 0.8

vendor:d linkmodel:dwl-3200apscope:eqversion:firmware prior to 2.55rc549

Trust: 0.8

vendor:d linkmodel:dwl-3200apscope: - version: -

Trust: 0.6

vendor:d linkmodel:dwl-2100apscope: - version: -

Trust: 0.6

vendor:d linkmodel:des-3800scope: - version: -

Trust: 0.6

vendor:dlinkmodel:dwl-3200apscope: - version: -

Trust: 0.6

vendor:dlinkmodel:des-3800scope: - version: -

Trust: 0.6

vendor:dlinkmodel:dwl-2100apscope: - version: -

Trust: 0.6

vendor:d linkmodel:dwl-3200apscope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dwl-2100apscope:eqversion:0

Trust: 0.3

vendor:d linkmodel:des-3800scope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dwl-3200ap 2.55rc549scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dwl-2100ap 2.50rc548scope:neversion: -

Trust: 0.3

vendor:d linkmodel:des-3800 r4.50b052scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2011-4566 // BID: 50405 // JVNDB: JVNDB-2011-000092 // CNNVD: CNNVD-201110-688 // NVD: CVE-2011-3992

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3992
value: HIGH

Trust: 1.0

IPA: JVNDB-2011-000092
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201110-688
value: CRITICAL

Trust: 0.6

VULHUB: VHN-51937
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-3992
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2011-000092
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-51937
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-51937 // JVNDB: JVNDB-2011-000092 // CNNVD: CNNVD-201110-688 // NVD: CVE-2011-3992

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-51937 // JVNDB: JVNDB-2011-000092 // NVD: CVE-2011-3992

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201110-688

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201110-688

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-000092

PATCH

title:DL-VU2011-001 "vulnerability in the SSH function"url:http://www.dlink-jp.com/page/sc/F/security_info.html

Trust: 0.8

title:Top Pageurl:http://www.dlink-jp.com/

Trust: 0.8

title:Patch for D-Link Multiple Products Remote Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/5700

Trust: 0.6

sources: CNVD: CNVD-2011-4566 // JVNDB: JVNDB-2011-000092

EXTERNAL IDS

db:NVDid:CVE-2011-3992

Trust: 3.4

db:JVNid:JVN72640744

Trust: 2.9

db:JVNDBid:JVNDB-2011-000092

Trust: 2.6

db:SECUNIAid:46637

Trust: 1.5

db:BIDid:50405

Trust: 1.4

db:OSVDBid:76628

Trust: 1.1

db:CNNVDid:CNNVD-201110-688

Trust: 0.7

db:CNVDid:CNVD-2011-4566

Trust: 0.6

db:JVNid:JVN#72640744

Trust: 0.6

db:NSFOCUSid:18073

Trust: 0.6

db:VULHUBid:VHN-51937

Trust: 0.1

db:PACKETSTORMid:106360

Trust: 0.1

sources: CNVD: CNVD-2011-4566 // VULHUB: VHN-51937 // BID: 50405 // JVNDB: JVNDB-2011-000092 // PACKETSTORM: 106360 // CNNVD: CNNVD-201110-688 // NVD: CVE-2011-3992

REFERENCES

url:http://jvn.jp/en/jp/jvn72640744/index.html

Trust: 2.9

url:http://www.dlink-jp.com/page/sc/f/security_info20111028.html

Trust: 1.8

url:http://jvndb.jvn.jp/jvndb/jvndb-2011-000092

Trust: 1.7

url:http://www.securityfocus.com/bid/50405

Trust: 1.1

url:http://osvdb.org/76628

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3992

Trust: 0.8

url:http://www.ipa.go.jp/security/english/vuln/201110_dlink_en.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3992

Trust: 0.8

url:http://secunia.com/advisories/46637/http

Trust: 0.6

url:http://secunia.com/advisories/46637

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18073

Trust: 0.6

url:http://www.dlink.com/

Trust: 0.3

url:http://jvndb.jvn.jp/ja/contents/2011/jvndb-2011-000092.html

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/46637/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46637

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/46637/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/ovum_2011_request/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2011-4566 // VULHUB: VHN-51937 // BID: 50405 // JVNDB: JVNDB-2011-000092 // PACKETSTORM: 106360 // CNNVD: CNNVD-201110-688 // NVD: CVE-2011-3992

CREDITS

Hisashi Kojima

Trust: 0.6

sources: CNNVD: CNNVD-201110-688

SOURCES

db:CNVDid:CNVD-2011-4566
db:VULHUBid:VHN-51937
db:BIDid:50405
db:JVNDBid:JVNDB-2011-000092
db:PACKETSTORMid:106360
db:CNNVDid:CNNVD-201110-688
db:NVDid:CVE-2011-3992

LAST UPDATE DATE

2025-04-11T23:16:46.316000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-4566date:2011-10-31T00:00:00
db:VULHUBid:VHN-51937date:2018-10-30T00:00:00
db:BIDid:50405date:2011-10-28T00:00:00
db:JVNDBid:JVNDB-2011-000092date:2011-10-28T00:00:00
db:CNNVDid:CNNVD-201110-688date:2011-11-07T00:00:00
db:NVDid:CVE-2011-3992date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-4566date:2011-10-31T00:00:00
db:VULHUBid:VHN-51937date:2011-11-03T00:00:00
db:BIDid:50405date:2011-10-28T00:00:00
db:JVNDBid:JVNDB-2011-000092date:2011-10-28T00:00:00
db:PACKETSTORMid:106360date:2011-10-31T07:50:33
db:CNNVDid:CNNVD-201110-688date:2011-10-28T00:00:00
db:NVDid:CVE-2011-3992date:2011-11-03T17:55:01.717