ID

VAR-201708-0275


CVE

CVE-2014-7859


TITLE

plural D-Link Buffer error vulnerability in product firmware

Trust: 0.8

sources: JVNDB: JVNDB-2014-008365

DESCRIPTION

Stack-based buffer overflow in login_mgr.cgi in D-Link firmware DNR-320L and DNS-320LW before 1.04b08, DNR-322L before 2.10 build 03, DNR-326 before 2.10 build 03, and DNS-327L before 1.04b01 allows remote attackers to execute arbitrary code by crafting malformed "Host" and "Referer" header values. plural D-Link The product firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-link specializes in the design and development of wireless network and Ethernet road hardware products. A buffer overflow vulnerability exists in multiple D-Link products. Perform a boundary check before failing to copy the user-supplied data to a memory buffer of sufficient size. Allows an attacker to exploit a vulnerability to execute arbitrary code in the context of an application or to initiate a denial of service attack. Failed exploits may result in denial-of-service conditions. D-Link DNR-320L and others are network storage devices of D-Link. The following products and versions are affected: D-Link DNR-320L prior to 1.04b08; DNS-320LW prior to 1.04b08; DNR-322L prior to 2.10 build 03; DNR-326 prior to 2.10 build 03; Versions prior to 327L 1.04b01. Overwiew -------- SEARCH-LAB performed an independent security assessment on four different D-Link devices. The assessment has identified altogether 53 unique vulnerabilities in the latest firmware (dated 30-07-2014). We list below several of the problematic areas, where the most critical findings were discovered: - Authentication can be bypassed in several ways, allowing an attacker to take full control over the device without the need to exploit any programming or design bugs. - We found a few half-baked security workarounds to fix earlier vulnerabilities that introduced even more serious problems, leading to command injection and the possibility to take full control over the device. - Even though there were several security patches and workarounds in the session management part of the code, where we still found serious problems. It was still possible to perform unauthenticated file upload to an arbitrarily chosen location, which also lead to the possibility for an attacker to take full control over the device. - Default users (root, nobody) can be used during authentication, and the administrator cannot change the default (empty) password of these users from the user interface. Details and CVEs ---------------- For the specific details see our full report in [SL-ADV]. We suppose that some of the vulnerabilities were discovered by other researchers too, but we saw it reasonable and useful to publish our findings in such a comprehensive study. Naturally in the report we tried to find and reference all of the previous publications that may have found the same problems. We obtained the following CVE numbers for the above described vulnerabilities: - CVE-2014-7858: Check_login bypass vulnerability in DNR-326 - CVE-2014-7859: Buffer overflow in login_mgr.cgi and in file_sharing.cgi - CVE-2014-7860: Unauthenticated photo publish We also reported two other authentication bypass vulnerabilities (CVE-2014-7857) to D-Link; but since these problems have not been addressed correctly yet, we will only publish them after 22/06/2015. Affected devices ---------------- Main targeted devices during the assessment: - DNS-320, Revision A: 2.03, 13/05/2013 - DNS-320L, 1.03b04, 11/11/2013 - DNS-327L, 1.02, 02/07/2014 - DNR-326, 1.40b03, 7/19/2013 Other devices were influenced by one or more vulnerabilities: - DNS-320B, 1,02b01, 23/04/2014 - DNS-345, 1.03b06, 30/07/2014 - DNS-325, 1.05b03, 30/12/2013 - DNS-322L, 2.00b07 See [SL-ADV] for the complete vulnerability matrix at the time of the assessment. We note that other devices may also be vulnerable. Solution -------- Most of the vulnerabilities were fixed in: - DNS-320L 1.04.B12 - DNS-327L 1.03.B04 Some of the vulnerabilities were fixed in: - DNR-326 2.10.B03 - DNR-322L 2.10.B03 Besides installing the patches, where available, we highly recommend not to expose the web interface of the DNS and DNR devices to the internet. Since the devices use the UPnP feature, you should disable it in the router. Credits ------- These vulnerabilities were discovered and researched by Gergely Eberhardt (@ebux25) from SEARCH-LAB Ltd. (www.search-lab.hu) References ---------- [SL-ADV] Security Advisory, MULTIPLE VULNERABILITIES IN D-LINK DNS-320, 320L, 327L AND DNR-326 DEVICES, http://www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdf [DNS-320] http://support.dlink.com/ProductInfo.aspx?m=DNS-320 [DNS-320L] http://support.dlink.com/ProductInfo.aspx?m=DNS-320L [DNS-327L] http://support.dlink.com/ProductInfo.aspx?m=DNS-327L [DNS-345] http://support.dlink.com/ProductInfo.aspx?m=DNS-345 [DNS-325] http://support.dlink.com/ProductInfo.aspx?m=DNS-325 [DNR-326] http://support.dlink.com/ProductInfo.aspx?m=DNR-326 [DNR-322L] http://support.dlink.com/ProductInfo.aspx?m=DNR-322L

Trust: 2.61

sources: NVD: CVE-2014-7859 // JVNDB: JVNDB-2014-008365 // CNVD: CNVD-2015-03604 // BID: 74878 // VULHUB: VHN-75804 // PACKETSTORM: 132075

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-03604

AFFECTED PRODUCTS

vendor:d linkmodel:dns-320lwscope:lteversion:1.03b04

Trust: 1.0

vendor:d linkmodel:dnr-320lscope:lteversion:1.03b04

Trust: 1.0

vendor:d linkmodel:dnr-326scope:lteversion:1.40b03

Trust: 1.0

vendor:d linkmodel:dns-327lscope:lteversion:1.02

Trust: 1.0

vendor:d linkmodel:dns-322lscope:lteversion:2.00b07

Trust: 1.0

vendor:d linkmodel:dns-327lscope:eqversion:1.02

Trust: 0.9

vendor:d linkmodel:d-link dnr-320lscope:ltversion:1.04b08

Trust: 0.8

vendor:d linkmodel:d-link dnr-326scope:ltversion:2.10 build 03

Trust: 0.8

vendor:d linkmodel:d-link dns-320lwscope:ltversion:1.04b08

Trust: 0.8

vendor:d linkmodel:d-link dns-322lscope:ltversion:2.10 build 03

Trust: 0.8

vendor:d linkmodel:d-link dns-327lscope:ltversion:1.04b01

Trust: 0.8

vendor:d linkmodel:routerscope: - version: -

Trust: 0.6

vendor:d linkmodel:dnr-326scope:eqversion:1.40b03

Trust: 0.6

vendor:d linkmodel:dns-320lwscope:eqversion:1.03b04

Trust: 0.6

vendor:d linkmodel:dnr-320lscope:eqversion:1.03b04

Trust: 0.6

vendor:d linkmodel:dns-322lscope:eqversion:2.00b07

Trust: 0.6

vendor:d linkmodel:dns-345 1.03b06scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-325 1.05b03scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-322l 2.00b07scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-320l 1.03b04scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-320b 1.02b01scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-320scope:eqversion:2.03

Trust: 0.3

vendor:d linkmodel:dnr-326 1.40b03scope: - version: -

Trust: 0.3

vendor:d linkmodel:dns-327l 1.03.b04scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dns-320l 1.04.b12scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dnr-326 2.10.b03scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dnr-322l 2.10.b03scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2015-03604 // BID: 74878 // JVNDB: JVNDB-2014-008365 // CNNVD: CNNVD-201506-078 // NVD: CVE-2014-7859

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-7859
value: CRITICAL

Trust: 1.0

NVD: CVE-2014-7859
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2015-03604
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201506-078
value: CRITICAL

Trust: 0.6

VULHUB: VHN-75804
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-7859
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-03604
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-75804
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2014-7859
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2015-03604 // VULHUB: VHN-75804 // JVNDB: JVNDB-2014-008365 // CNNVD: CNNVD-201506-078 // NVD: CVE-2014-7859

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-75804 // JVNDB: JVNDB-2014-008365 // NVD: CVE-2014-7859

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 132075 // CNNVD: CNNVD-201506-078

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201506-078

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-008365

PATCH

title:Top Pageurl:http://support.dlink.com/

Trust: 0.8

title:Patch for multiple D-Link product buffer overflow vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/59307

Trust: 0.6

title:Multiple D-Link Product buffer overflow error hole repair measuresurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=90845

Trust: 0.6

sources: CNVD: CNVD-2015-03604 // JVNDB: JVNDB-2014-008365 // CNNVD: CNNVD-201506-078

EXTERNAL IDS

db:NVDid:CVE-2014-7859

Trust: 3.5

db:BIDid:74878

Trust: 2.6

db:PACKETSTORMid:132075

Trust: 1.8

db:JVNDBid:JVNDB-2014-008365

Trust: 0.8

db:CNNVDid:CNNVD-201506-078

Trust: 0.7

db:CNVDid:CNVD-2015-03604

Trust: 0.6

db:VULHUBid:VHN-75804

Trust: 0.1

sources: CNVD: CNVD-2015-03604 // VULHUB: VHN-75804 // BID: 74878 // JVNDB: JVNDB-2014-008365 // PACKETSTORM: 132075 // CNNVD: CNNVD-201506-078 // NVD: CVE-2014-7859

REFERENCES

url:http://www.securityfocus.com/bid/74878

Trust: 2.9

url:http://www.search-lab.hu/media/d-link_security_advisory_3_0_public.pdf

Trust: 2.9

url:http://packetstormsecurity.com/files/132075/d-link-bypass-buffer-overflow.html

Trust: 2.3

url:http://www.securityfocus.com/archive/1/535626/100/200/threaded

Trust: 1.7

url:http://seclists.org/fulldisclosure/2015/may/125

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-7859

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7859

Trust: 0.8

url:http://www.dlink.com/

Trust: 0.3

url:http://support.dlink.com/productinfo.aspx?m=dns-345

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dns-320

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dns-320l

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dns-325

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dnr-322l

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dns-327l

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7858

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7857

Trust: 0.1

url:https://www.search-lab.hu)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7860

Trust: 0.1

url:http://support.dlink.com/productinfo.aspx?m=dnr-326

Trust: 0.1

sources: CNVD: CNVD-2015-03604 // VULHUB: VHN-75804 // BID: 74878 // JVNDB: JVNDB-2014-008365 // PACKETSTORM: 132075 // CNNVD: CNNVD-201506-078 // NVD: CVE-2014-7859

CREDITS

Search-Laboratory Ltd.

Trust: 0.9

sources: BID: 74878 // CNNVD: CNNVD-201506-078

SOURCES

db:CNVDid:CNVD-2015-03604
db:VULHUBid:VHN-75804
db:BIDid:74878
db:JVNDBid:JVNDB-2014-008365
db:PACKETSTORMid:132075
db:CNNVDid:CNNVD-201506-078
db:NVDid:CVE-2014-7859

LAST UPDATE DATE

2024-11-23T22:07:18.046000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-03604date:2015-06-05T00:00:00
db:VULHUBid:VHN-75804date:2019-03-19T00:00:00
db:BIDid:74878date:2015-05-28T00:00:00
db:JVNDBid:JVNDB-2014-008365date:2017-09-28T00:00:00
db:CNNVDid:CNNVD-201506-078date:2023-04-27T00:00:00
db:NVDid:CVE-2014-7859date:2024-11-21T02:18:09.227

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-03604date:2015-06-05T00:00:00
db:VULHUBid:VHN-75804date:2017-08-25T00:00:00
db:BIDid:74878date:2015-05-28T00:00:00
db:JVNDBid:JVNDB-2014-008365date:2017-09-28T00:00:00
db:PACKETSTORMid:132075date:2015-05-28T13:03:33
db:CNNVDid:CNNVD-201506-078date:2015-05-28T00:00:00
db:NVDid:CVE-2014-7859date:2017-08-25T18:29:00.340