Buffer-overflow in ASUS Remote Console 2.0.0.24

2008.03.26
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

####################################################################### Luigi Auriemma Application: ASUS Remote Console http://www.asus.com/999/html/share/9/icon/9/index.htm#asmb3 Versions: <= 2.0.0.24 Platforms: Windows Bug: buffer overflow Exploitation: remote Date: 21 Mar 2008 Author: Luigi Auriemma e-mail: aluigi (at) autistici (dot) org [email concealed] web: aluigi.org ####################################################################### 1) Introduction 2) Bug 3) The Code 4) Fix ####################################################################### =============== 1) Introduction =============== From the manual: "The ASUS Remote Console (ARC) is an efficient and flexible application that allows monitoring and control of the remote host." The main component of this service is a telnet server listening on port 623 which is called DpcProxy and provides an IPMI interface. ####################################################################### ====== 2) Bug ====== The DPC Proxy is affected by a buffer-overflow vulnerability located in the function which gets the data received from the client, stores them in a stack buffer of about 1024 bytes and checks the presence of an end of line delimiter (carriage return). ####################################################################### =========== 3) The Code =========== http://aluigi.org/poc/asuxdpc.txt nc SERVER 623 -v -v -w 2 < asuxdpc.txt ####################################################################### ====== 4) Fix ====== No fix ####################################################################### --- Luigi Auriemma http://aluigi.org


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top