lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030331154207.30917.qmail@www.securityfocus.com>
Date: 31 Mar 2003 15:42:07 -0000
From: Arhont Information Security <infosec@...ont.com>
To: bugtraq@...urityfocus.com
Subject: Security issues in D-Link DSL-300/DSL-300G+ Broadband Modem/Router




Arhont Ltd	- 	Information Security Company

Arhont Advisory by:		Andrei Mikhailovsky (www.arhont.com)
Advisory:			D-Link DSL Broadband Modem/Router 
Router Model Name:		D-Link DSL-300G/DSL-300G+
Model Specific:			Other models might be vulnerable as well
Manufacturer site:		http://www.dlink.com
Manufacturer contact (UK):	Tel: 0800 9175063 / 0845
0800288		
Contact Date:			06/03/2003

DETAILS:

While performing a general security testing of a
network, we have found several security vulnerability
issues with the D-Link DSL Broadband Modems models:
DSL-300G and DSL-300G+. This issue is similar to the
one found in D-link DSL-500 modem/router
(http://www.securityfocus.com/archive/1/316489/2003-03-27/2003-04-02/0).

Issue 1:
The default router installation enables SNMP (Simple
Network Management Protocol) server with default
community names for read and read/write access. The
models DSL-300G and DSL-300G+ only allow SNMP access
from the LAN (Local Area Network) side.

andrei@...le:~/bugtraq/DSL-modems$ snmpwalk -Os -c
public 192.168.0.1 -v 1
sysDescr.0 = STRING: D-Link DSL-300G+ version 7.1.0.30
ANNEXA  (Oct 18 2002) R2.05.b4t9uk
Copyright (c) 2000 Dlink Corp.
sysObjectID.0 = OID: enterprises.171.10.30.1
sysUpTime.0 = Timeticks: (27941701) 3 days, 5:36:57.01
...
...

The community name: public 

allows read access to the mentioned devices, allowing
enumeration and gathering of sensitive network
information.  

The community name: private 

allows read/write access to devices, thus allowing
change of the network settings of the broadband modem.

Impact: This vulnerability allows local malicious
attackers to retrieve and change network settings of
the modem.

Risk Factor: Medium/High

Possible Solutions:  
1. Firewall UDP port 161 from LAN/WAN sides, as it is
not possible to disable SNMP service from the web
management interface.
2. You can change or disable snmp default settings by
connecting to the modem/router using telnet with
password string: "private". (This solution has been
pointed out by Snowy Maslov <Snowy.Maslov@...itsu.com.au>)

Issue2:
Default remote administration access password via
telnet can not be changed during the setup via web
interface.  Even after configuring the modem in web
interface and changing default password, malicious
attackers can access the unit with telnet and default
administrator password "private".

Fisk Factor: Medium/High

Possible Solutions: Manually change the default
password via telnet and reboot the modem.

Issue 3:
The ISP account information including login name and
password is stored on the modem without encryption,  It
is therefore possible to retrieve this information with
simple SNMP gathering utility such as snmpwalk:

andrei@...le:~/bugtraq/DSL-modems$ snmpwalk -Os -c
public 192.168.0.1 -v 1
sysDescr.0 = STRING: D-Link DSL-300G+ version 7.1.0.30
ANNEXA  (Oct 18 2002) R2.05.b4t9uk
Copyright (c) 2000 Dlink Corp.
sysObjectID.0 = OID: enterprises.171.10.30.1
...
...
...
transmission.23.2.3.1.5.2.1 = STRING:
"username@...-provider"
...
...
transmission.23.2.3.1.6.2.1 = STRING: "password-string"
...
...
... 

Impact: This vulnerability allows LAN malicious
attackers to retrieve confidential information.

Risk Factor: Very High

Possible Solutions:  As a temporary solution you should
firewall UDP port 161 from LAN sides, as it is not
possible to disable SNMP service from the web
management interface.

According to the Arhont Ltd. policy, all of the found
vulnerabilities and security issues will be reported to
the manufacturer 7 days before releasing them to the
public domains (such as CERT and BUGTRAQ), unless
specifically requested by the manufacturer.

If you would like to get more information about this
issue, please do not hesitate to contact Arhont team.


Kind Regards,

Andrei Mikhailovsky
Arhont Ltd
http://www.arhont.com
GnuPG Keyserver: blackhole.pca.dfn.de
GnuPG Key:	 0xFF67A4F4


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ