ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA21081] D-Link Routers UPnP M-SEARCH Request Buffer Overflow



> 
> TITLE:
> D-Link Routers UPnP M-SEARCH Request Buffer Overflow
> 
> SECUNIA ADVISORY ID:
> SA21081
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/21081/
> 
> CRITICAL:
> Moderately critical
> 
> IMPACT:
> System access
> 
> WHERE:
> From local network
> 
> OPERATING SYSTEM:
> D-Link DI-524
> http://secunia.com/product/8028/
> D-Link DI-604 Broadband Router
> http://secunia.com/product/11068/
> D-Link DI-624
> http://secunia.com/product/3660/
> D-Link DI-784
> http://secunia.com/product/8029/
> D-Link EBR-2310 Ethernet Broadband Router
> http://secunia.com/product/11069/
> D-Link WBR-1310 Wireless G Router
> http://secunia.com/product/11070/
> D-Link WBR-2310 RangeBooster G Router
> http://secunia.com/product/11071/
> 
> DESCRIPTION:
> eEye Digital Security has reported a vulnerability in various D-Link
> routers, which can be exploited by malicious people to compromise a
> vulnerable network device.
> 
> The vulnerability is caused due to a boundary error in the UPnP
> service when processing "M-SEARCH" requests. This can be exploited to
> cause a stack-based buffer overflow by sending an "M-SEARCH" request
> with an overly long string (about 800 bytes) to port 1900/UDP.
> 
> Successful exploitation allows execution of arbitrary code.
> 
> SOLUTION:
> Updates are available for download from the D-Link web site.
> 
> PROVIDED AND/OR DISCOVERED BY:
> Barnaby Jack, eEye Digital Security.
> 
> ORIGINAL ADVISORY:
> eEye Digital Security:
> http://www.eeye.com/html/research/advisories/AD20060714.html
> 




 




Copyright © Lexa Software, 1996-2009.