CVE-2002-2116
CVSS5.0
发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:32:22
NMCO    

[原文]Netgear RM-356 and RT-338 series SOHO routers allow remote attackers to cause a denial of service (crash) via a UDP port scan, as demonstrated using nmap.


[CNNVD]Netgear SOHO Router UDP端口扫描拒绝服务漏洞(CNNVD-200212-809)

        
        RM-356是Netgear开发的硬件路由器,适用于家庭或小型办公网络。
        UDP扫描会导致RM-356、RT-338崩溃。需要冷启动才可恢复正常。
        # nmap -sU 210.9.238.103 -T5
        此时RM-356的主控台发生crashdump,信息如下
        Menu 24.2.1 - System Maintenance - Information
         Name: *******_netgear
         Routing: IP
         RAS F/W Version: V2.21(I.03) | 3/30/2000
         MODEM 1 F/W Version: V2.210-V90_2M_DLS
         Country Code: 244
         LAN
         Ethernet Address: 00:a0:c5:e3:**:**
         IP Address: 192.168.0.1
         IP Mask: 255.255.255.0
         DHCP: Server
        CRASHDUMP::
        54f7a0: 00 54 f7 a8 00 21 e9 38 00 54 f8 10 00 21 e9 38 .T...!.8.T...!.8
        54f7b0: 00 00 00 07 00 41 37 bc 00 2b 09 ca 00 00 00 00 .....A7..+......
        54f7c0: 00 55 24 4c 00 2b 09 b2 00 00 00 00 00 55 24 4c .U$L.+.......U$L
        54f7d0: 00 00 00 05 00 00 00 00 00 21 16 24 00 57 26 04 .........!.$.W&.
        54f7e0: 00 58 5e e8 00 21 16 24 00 00 26 04 00 21 16 24 .X^..!.$..&..!.$
        54f7f0: 00 41 20 00 00 54 f8 10 00 21 ea 34 00 41 20 00 .A ..T...!.4.A .
        54f800: 00 00 00 07 ff ff ff ff 00 54 f8 10 00 21 e6 6e .........T...!.n
        54f810: 00 54 f8 2c 00 21 e6 6e 00 41 37 bc ff ff ff ff .T.,.!.n.A7.....
        54f820: ff ff 20 04 00 5e 2e 60 00 40 f7 20 00 54 f8 68 .. ..^.`.@. .T.h
        54f830: 00 21 b0 00 00 00 00 01 00 2b 09 ca ff ff ff ff .!.......+......
        54f840: 00 00 00 07 00 2b 09 b2 00 5e 2e 60 00 00 00 00 .....+...^.`....
        54f850: ff ff ff ff 00 00 00 00 00 00 00 00 00 54 f9 9c .............T..
        54f860: 00 5e 2e 60 00 00 00 00 00 54 f8 a8 00 21 a8 1a .^.`.....T...!..
        54f870: 00 00 00 07 ff ff ff ff 00 5e 2e 60 00 00 00 00 .........^.`....
        54f880: 00 00 00 08 00 00 00 00 00 00 00 21 00 00 00 24 ...........!...$
        54f890: 00 00 00 00 00 54 f9 9c 00 5f ec d0 00 55 24 4c .....T..._...U$L
        54f8a0: 00 55 24 4c 00 5e 2e 60 00 54 f8 fc 00 23 b8 42 .U$L.^.`.T...#.B
        Boot Module Version : 4.40. Built at Wed Feb 23 14:00:29 2000
        但是TCP connect()扫描正常。
        值得注意的是,即使SNMP 161/UDP并未开放,上述扫描同样会导致崩溃。问题可能位
        于过滤代码中。绝大多数SOHO Netgear设备有简单的过滤机制。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:netgear:rt338NetGear RT338
cpe:/h:netgear:rm356NetGear RM356

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2116
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-2116
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200212-809
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4111
(UNKNOWN)  BID  4111
http://www.iss.net/security_center/static/8206.php
(UNKNOWN)  XF  netgear-udp-portscan-dos(8206)
http://archives.neohapsis.com/archives/bugtraq/2002-02/0183.html
(UNKNOWN)  BUGTRAQ  20020215 Re: Remote DoS in Netgear RM-356
http://archives.neohapsis.com/archives/bugtraq/2002-02/0162.html
(UNKNOWN)  BUGTRAQ  20020215 Remote DoS in Netgear RM-356

- 漏洞信息

Netgear SOHO Router UDP端口扫描拒绝服务漏洞
中危 设计错误
2002-12-31 00:00:00 2006-01-25 00:00:00
远程  
        
        RM-356是Netgear开发的硬件路由器,适用于家庭或小型办公网络。
        UDP扫描会导致RM-356、RT-338崩溃。需要冷启动才可恢复正常。
        # nmap -sU 210.9.238.103 -T5
        此时RM-356的主控台发生crashdump,信息如下
        Menu 24.2.1 - System Maintenance - Information
         Name: *******_netgear
         Routing: IP
         RAS F/W Version: V2.21(I.03) | 3/30/2000
         MODEM 1 F/W Version: V2.210-V90_2M_DLS
         Country Code: 244
         LAN
         Ethernet Address: 00:a0:c5:e3:**:**
         IP Address: 192.168.0.1
         IP Mask: 255.255.255.0
         DHCP: Server
        CRASHDUMP::
        54f7a0: 00 54 f7 a8 00 21 e9 38 00 54 f8 10 00 21 e9 38 .T...!.8.T...!.8
        54f7b0: 00 00 00 07 00 41 37 bc 00 2b 09 ca 00 00 00 00 .....A7..+......
        54f7c0: 00 55 24 4c 00 2b 09 b2 00 00 00 00 00 55 24 4c .U$L.+.......U$L
        54f7d0: 00 00 00 05 00 00 00 00 00 21 16 24 00 57 26 04 .........!.$.W&.
        54f7e0: 00 58 5e e8 00 21 16 24 00 00 26 04 00 21 16 24 .X^..!.$..&..!.$
        54f7f0: 00 41 20 00 00 54 f8 10 00 21 ea 34 00 41 20 00 .A ..T...!.4.A .
        54f800: 00 00 00 07 ff ff ff ff 00 54 f8 10 00 21 e6 6e .........T...!.n
        54f810: 00 54 f8 2c 00 21 e6 6e 00 41 37 bc ff ff ff ff .T.,.!.n.A7.....
        54f820: ff ff 20 04 00 5e 2e 60 00 40 f7 20 00 54 f8 68 .. ..^.`.@. .T.h
        54f830: 00 21 b0 00 00 00 00 01 00 2b 09 ca ff ff ff ff .!.......+......
        54f840: 00 00 00 07 00 2b 09 b2 00 5e 2e 60 00 00 00 00 .....+...^.`....
        54f850: ff ff ff ff 00 00 00 00 00 00 00 00 00 54 f9 9c .............T..
        54f860: 00 5e 2e 60 00 00 00 00 00 54 f8 a8 00 21 a8 1a .^.`.....T...!..
        54f870: 00 00 00 07 ff ff ff ff 00 5e 2e 60 00 00 00 00 .........^.`....
        54f880: 00 00 00 08 00 00 00 00 00 00 00 21 00 00 00 24 ...........!...$
        54f890: 00 00 00 00 00 54 f9 9c 00 5f ec d0 00 55 24 4c .....T..._...U$L
        54f8a0: 00 55 24 4c 00 5e 2e 60 00 54 f8 fc 00 23 b8 42 .U$L.^.`.T...#.B
        Boot Module Version : 4.40. Built at Wed Feb 23 14:00:29 2000
        但是TCP connect()扫描正常。
        值得注意的是,即使SNMP 161/UDP并未开放,上述扫描同样会导致崩溃。问题可能位
        于过滤代码中。绝大多数SOHO Netgear设备有简单的过滤机制。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 厂商建议telnet到该设备,在Menu 15中将Default地址从0.0.0.0修改成一个局域网内不存在的IP地址,比如192.168.0.99,这样端口扫描将被转发到一个"黑洞"中。厂商并不打算发布新的firmware修正该问题。
        厂商补丁:
        Netgear
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.netgear.com/

- 漏洞信息

19774
Multiple Router UDP Port Scan Remote DoS
Remote / Network Access Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-02-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站