The OpenNET Project / Index page
BSD, Linux, Cisco, Web, Palm, other unix
RUSSIAN version

Search
Выпущена CD-версия OpenNet.RU для оффлайн просмотра.
Для формирования заказа - перейдите по ссылке
.
SOFT - Unix Software catalog
LINKS - Unix resources
TOPIC - Articles from usenet
DOCUMENTATION - Unix guides
News | Tips | MAN | Forum | BUGs | LastSoft | Keywords | BOOKS (selected) | Linux HowTo | FAQ Archive

possible exploit: D-Link DI-804 unauthorized DHCP release from WAN


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 22 Aug 2002 07:06:48 -0000
From: Jens Jensen <jpj@netcom-usa.com>
To: bugtraq@securityfocus.com
Subject: possible exploit: D-Link DI-804 unauthorized DHCP release from WAN



Problem: malicious user can release DHCP client on D-Link DI-804 router 
interrupting network communications

I need some other D-Link DI-804 users (as well as other dlink routers) to
see if they can reproduce this problem--
With "remote administration" mode enabled to any IP (web interface wide 
open
on WAN side), It seems that a malicious user can activate DHCP
release/renew without first being authenticated as the admin (priviledged
user)

the webpage that I can get to on the dlink built in web interface is
http://xxx.xxx.xxx.xxx/release.htm
where xxx.xxx.xxx.xxx is the ip address of your router, specifically for
these purposes, the wan ip address

firmware: 4.68
device: DI-804

This would be a BAD thing, since an attacker could interrupt communications
on the router
This can be temporarily fixed by either disabling "remote administration" 
or limiting the IP addresses allowed to remote admin.
I have submitted this to D-Link support.
I'm also wondering what other D-Link routers this could affect.

Jens Jensen
MCP, CCNA

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Закладки
Добавить в закладки
Created 1996-2003 by Maxim Chirkov  
ДобавитьРекламаВебмастеруЦУПГИД  
SpyLOG TopList