Flaw in AVM UPNP service for windows

2007.01.19
Credit: DPR
Risk: Low
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

- Description The "AVM IGD CTRL Service", a Universal Plug and Play (UPNP) service for windows, which is part of the software package "Fritz!DSL Software 02.02.29" provides the possibility to read any file on the windows system partition for any user - no matter how much restricted rights the user has. It is even possible to read files from any LAN computer on which this service is running and it is possible to read critical system files (SAM DB copies, profile files of any user) because the service is running under the (locally) most privileged system account. The mentioned software package is shipped with VOIP routers from the german company AVM (www.avm.de). - Reproduction Relative URLs for the AR7 webserver (which is part of the mentioned UPNP service) can be used to read files on the system partition. Because backslashes can't be directly used in a URL "%5C" has to be used. Examples for local and remote files of LAN computers: http://localhost:49001/..%5C..%5C..%5Cwindows%5Csystem.ini http://192.168.178.20:49001/..%5C..%5C..%5Cwindows%5Csystem.ini - Workaround Disable the "AVM IGD CTRL Service" under the services control panel. Regards, -- DPR


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top