TUCoPS :: Network Appliances :: a6052.htm

SOHO Routefinder 550 VPN Denial of Service and Buffer Overflow
12th Mar 2003 [SBWID-6052]
COMMAND

	SOHO Routefinder 550 VPN Denial of Service and Buffer Overflow

SYSTEMS AFFECTED

	 RF550VPN Firmware v463, v464 beta
	 prior versions are vulnerable - other models might be affected as well

PROBLEM

	In Peter Kruse Advisory [http://www.krusesecurity.dk]:
	
	 Legal Notice:
	
	This Advisory is copyright by  Peter  Kruse.  You  may  distribute  this
	unmodified.
	
	 Disclaimer:
	
	The opinions expressed in this advisory are my own and not that  of  any
	company. The usual standard  disclaimer  applies,  especially  the  fact
	that Peter Kruse or Kruse Security is not liable for any damages  caused
	by direct or indirect use of the information or  functionality  provided
	by this advisory or program.
	
	 Vendor Description:
	
	The  SOHO  RouteFinder  is  ideal  for  the  small  branch   office   or
	telecommuter who needs secure access to the corporate LAN.  In  addition
	to providing a WAN Ethernet port for DSL  or  cable  broadband  Internet
	access,  it  also  offers  both   client-to-LAN   and   LAN-to-LAN   VPN
	connectivity based on the IPSec protocol. It  supports  up  to  5  IPSec
	tunnels and provides 3DES encryption with 700K bps throughput.
	
	 Problem:
	
	The Multitech Routefinder supports  login  through  a  webinterface.  By
	default the interface is enabled on the LAN side with  a  default  login
	"admin" and a blank password.
	
	The weakness is found in the web software implemented on the  router.  A
	user on the LAN side is able to initiate  a  Denial  of  Service  attack
	against the router and cause it to fail to  respond.  This  would  block
	all Internet trafic. More scary  the  fact  that  it's  possible  for  a
	remote hostile attacker to execute code on the  box.  This  is  critical
	since the router is mainly used as a VPN box for  the  SOHO  market.  In
	order to attack the box from the  outside  it  would  require  that  the
	webinterface is enabled on the external side. This would often  be  done
	for remote administration.
	
	 Description:
	
	The flaw can be exploited with a GET /OPTIONS parameter.
	By supplying an overlong URL: GET /OPTIONS AAAAA..[Ax10001]..AAAAA.HTML HTTP/1.1 we can 
	break the box. This  allows  a  hostile  user  to  corrupt  memory  with
	attacker-supplied data.
	
	When the box receives the overlong URL it will reboot.
	
	

SOLUTION

	Multitech has released new firmware that fixes this issue.
	
	The firmware can be downloaded from this URL:
	
	http://www.multitech.com/SUPPORT/SOHO_VPN/firmware.asp
	
	(Please note that the firmaware that fixes this issue is still  named  v
	4.63).
	
	Log:
	
	12.2.2003: Vendor contacted at (sales,support,security@multitech.com)
	17.2.2003: Vendor contacted - reminder
	19.2.2003: Reply - working to reproduce the problem
	28.2.2003: Proof of concept code supplied in order to reproduce problem
	7.3.2003:  New firmware released - Tested and confirmed to fix the problem
	11.3.2003:  Official release of this advisory
	
	
	This advisory can be found online on:
	
	http://www.krusesecurity.dk/advisories/routefind550bof.txt
	
	
	

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH