>
> TITLE:
> D-Link Routers UPnP M-SEARCH Request Buffer Overflow
>
> SECUNIA ADVISORY ID:
> SA21081
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> System access
>
> WHERE:
> From local network
>
> OPERATING SYSTEM:
> D-Link DI-524
>
> D-Link DI-604 Broadband Router
>
> D-Link DI-624
>
> D-Link DI-784
>
> D-Link EBR-2310 Ethernet Broadband Router
>
> D-Link WBR-1310 Wireless G Router
>
> D-Link WBR-2310 RangeBooster G Router
>
>
> DESCRIPTION:
> eEye Digital Security has reported a vulnerability in various D-Link
> routers, which can be exploited by malicious people to compromise a
> vulnerable network device.
>
> The vulnerability is caused due to a boundary error in the UPnP
> service when processing "M-SEARCH" requests. This can be exploited to
> cause a stack-based buffer overflow by sending an "M-SEARCH" request
> with an overly long string (about 800 bytes) to port 1900/UDP.
>
> Successful exploitation allows execution of arbitrary code.
>
> SOLUTION:
> Updates are available for download from the D-Link web site.
>
> PROVIDED AND/OR DISCOVERED BY:
> Barnaby Jack, eEye Digital Security.
>
> ORIGINAL ADVISORY:
> eEye Digital Security:
>
>