CVE-2002-0888
CVSS7.5
发布时间 :2002-10-04 00:00:00
修订时间 :2012-05-11 21:16:11
NMCOS    

[原文]3Com OfficeConnect Remote 812 ADSL Router, firmware 1.1.9 and 1.1.7, allows remote attackers to bypass port access restrictions by connecting to an approved port and quickly connecting to the desired port, which is allowed by the router.


[CNNVD]3Com OfficeConnect ADSL路由器端口地址转换访问控制可绕过漏洞(CNNVD-200210-121)

        
        3Com OfficeConnect ADSL router是一款由3Com开发的路由器。
        3Com OfficeConnect ADSL路由器存在设计漏洞,可导致远程攻击者未授权访问路由器后的系统信息。
        3Com OfficeConnect ADSL路由器包含PAT端口地址转换功能用于访问路由器后系统的所有端口,当我们尝试连接没有重定向到路由器后系统的端口时,路由器就拒绝此连接,但是如果在我们连接使用PAT重定向端口之前,迅速尝试连接PAT没有重定向的任意端口,路由器就会允许连接到这些端口,可使攻击者进行扫描等活动,获得网络内部系统信息。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:3com:3cp4144:1.1.93Com OfficeConnect ADSL Router 812 1.1.9
cpe:/h:3com:3cp4144:1.1.73Com OfficeConnect ADSL Router 812 1.1.7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0888
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0888
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-121
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4841
(VENDOR_ADVISORY)  BID  4841
http://www.iss.net/security_center/static/9185.php
(VENDOR_ADVISORY)  XF  3com-officeconnect-pat-access(9185)
http://archives.neohapsis.com/archives/bugtraq/2002-06/0102.html
(UNKNOWN)  BUGTRAQ  20020612 Part II: Vulnerability in 3Com® OfficeConnect® Remote 812 ADSL Router
http://archives.neohapsis.com/archives/bugtraq/2002-05/0230.html
(UNKNOWN)  BUGTRAQ  20020527 Vulnerability in 3Com® OfficeConnect® Remote 812 ADSL Router

- 漏洞信息

3Com OfficeConnect ADSL路由器端口地址转换访问控制可绕过漏洞
高危 设计错误
2002-10-04 00:00:00 2005-10-20 00:00:00
远程  
        
        3Com OfficeConnect ADSL router是一款由3Com开发的路由器。
        3Com OfficeConnect ADSL路由器存在设计漏洞,可导致远程攻击者未授权访问路由器后的系统信息。
        3Com OfficeConnect ADSL路由器包含PAT端口地址转换功能用于访问路由器后系统的所有端口,当我们尝试连接没有重定向到路由器后系统的端口时,路由器就拒绝此连接,但是如果在我们连接使用PAT重定向端口之前,迅速尝试连接PAT没有重定向的任意端口,路由器就会允许连接到这些端口,可使攻击者进行扫描等活动,获得网络内部系统信息。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时没有合适的临时解决方法。
        厂商补丁:
        3Com
        ----
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.3com.com/products/en_US/detail.jsp?tab=support&pathtype=support&sku=3CR414492-US

- 漏洞信息

6055
3Com OfficeConnect ADSL Router Port Translation Filter Bypass
Remote / Network Access Misconfiguration, Race Condition
Loss of Confidentiality

- 漏洞描述

3Com OfficeConnect DSL Router 812 contains a flaw that may allow a remote attacker to bypass access control restrictions. The issue is triggered when a remote attacker finds an approved port that has been redirected by PAT (Port Address Translation) and immediately connects to the desired port which is allowed by the router. It is possible that the flaw may allow access to systems behind the router resulting in a loss of confidentiality.

- 时间线

2002-05-27 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

3Com OfficeConnect ADSL Router Port Address Translation Access Control Bypassing Vulnerability
Design Error 4841
Yes No
2002-05-27 12:00:00 2009-07-11 01:56:00
Vulnerability discovery credited to Ismael Briones <ismael@el-mundo.net>.

- 受影响的程序版本

3Com OfficeConnect DSL Router 812 1.1.9
3Com OfficeConnect DSL Router 812 1.1.7

- 漏洞讨论

OfficeConnect ADSL routers are a hardware and switch solution distributed by 3Com.

Under some circumstances, it may be possible for a remote user to gain unauthorized access to information systems behind a 3Com OfficeConnect router. The OfficeConnect does not properly handle PAT, and may allow a remote attacker to connect to arbitrary ports on a system behind a PAT rule.

It has been reported that this issue results when iPAT/iNAT is enabled.

- 漏洞利用

No exploit is required for this vulnerability.

- 解决方案

There is an unofficial firmware upgrade available from the following URL:

http://www.adslnet.ws/

System Administrators are advised to use caution when installing unsupported software.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站