ID

VAR-201810-1456


CVE

CVE-2018-7631


TITLE

Epicentro Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-011655

DESCRIPTION

Buffer Overflow in httpd in EpiCentro E_7.3.2+ allows attackers to execute code remotely via a specially crafted GET request without a leading "/" and without authentication. Epicentro Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ADBEpicentro is a set of firmware used by ADB in Switzerland for use in ADB gateways and routers. Httpd is one of the HTTP servers. A buffer overflow vulnerability exists in httpd in the ADBEpicentroE_7.3.2+ release. CVE-2018-7633 Script Injection in ADB EpiCentro 7.3.2+ login form language parameter https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7633 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7633> Product: EpiCentro Vendor: ADB Global Tested Version: 7.3.2 CVE ID: 2018-7633 Severity: medium Severity Rating: CVSS v3 Base Score: 5,4 AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Impact: Execution of injected Javascript Locally Exploitable: no Remotely Exploitable: Yes Explanation: https://fschallock.wordpress.com/2018/10/08/cve-2018-7633-script-injection-in-the-login-form-language-parameter-of-adb-firmware-epicentro-7-3-2/ <https://fschallock.wordpress.com/2018/10/08/cve-2018-7633-script-injection-in-the-login-form-language-parameter-of-adb-firmware-epicentro-7-3-2/> 2. CVE-2018-7632 Buffer Overflow in ADB EpiCentro 7.3.2+ httpd leading to a Denial of Service condition https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7632 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7632> Product: EpiCentro Vendor: ADB Global Tested Version: 7.3.2 CVE ID: 2018-7632 Severity: severe Severity Rating: CVSS v3 Base Score: 7,5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Impact: Denial of Service Locally Exploitable: no Remotely Exploitable: Yes Explanation: https://fschallock.wordpress.com/2018/10/08/cve-2018-7632-buffer-overflow-in-httpd-in-epicentro-e_7-3-2-allows-attackers-to-cause-a-denial-of-service-attack-remotely-via-a-specially-crafted-get-request/ <https://fschallock.wordpress.com/2018/10/08/cve-2018-7632-buffer-overflow-in-httpd-in-epicentro-e_7-3-2-allows-attackers-to-cause-a-denial-of-service-attack-remotely-via-a-specially-crafted-get-request/> 3. CVE-2018- 7631 Buffer Overflow in ADB EpiCentro 7.3.2+ httpd leading to Remote Code Execution (RCE) https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7632 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7632> Product: EpiCentro Vendor: ADB Global Tested Version: 7.3.2 CVE ID: 2018-7631 Severity: critical Severity Rating: CVSS v3 Base Score: 10,0 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Impact: Code Execution Locally Exploitable: no Remotely Exploitable: Yes Explanation: https://fschallock.wordpress.com/2018/10/07/cve-2018-7631-rce-in-adb-epicentro-7-3-2-httpd/ <https://fschallock.wordpress.com/2018/10/07/cve-2018-7631-rce-in-adb-epicentro-7-3-2-httpd/> The vulnerabilities were discovered and disclosed to the manufacturer ADB and the ISP A1 Telekom Austria prior to general public announcement. In accordance to information received from both parties a fix has been produced and rolled out to all customers / devices. I have not examined the fix and therefore can not comment on its effectivity. Felix

Trust: 2.25

sources: NVD: CVE-2018-7631 // JVNDB: JVNDB-2018-011655 // CNVD: CNVD-2018-20873 // PACKETSTORM: 149976

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-20873

AFFECTED PRODUCTS

vendor:adbglobalmodel:epicentroscope:eqversion:7.3.2

Trust: 1.6

vendor:adbmodel:epicentroscope:eqversion:7.3.2

Trust: 0.8

vendor:adbmodel:epicentro e 7.3.2+scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2018-20873 // JVNDB: JVNDB-2018-011655 // CNNVD: CNNVD-201810-487 // NVD: CVE-2018-7631

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-7631
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-7631
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-20873
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201810-487
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2018-7631
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-20873
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-7631
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-20873 // JVNDB: JVNDB-2018-011655 // CNNVD: CNNVD-201810-487 // NVD: CVE-2018-7631

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2018-011655 // NVD: CVE-2018-7631

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201810-487

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201810-487

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011655

PATCH

title:Top Pageurl:https://www.adbglobal.com/

Trust: 0.8

sources: JVNDB: JVNDB-2018-011655

EXTERNAL IDS

db:NVDid:CVE-2018-7631

Trust: 3.1

db:JVNDBid:JVNDB-2018-011655

Trust: 0.8

db:CNVDid:CNVD-2018-20873

Trust: 0.6

db:CNNVDid:CNNVD-201810-487

Trust: 0.6

db:PACKETSTORMid:149976

Trust: 0.1

sources: CNVD: CNVD-2018-20873 // JVNDB: JVNDB-2018-011655 // PACKETSTORM: 149976 // CNNVD: CNNVD-201810-487 // NVD: CVE-2018-7631

REFERENCES

url:https://fschallock.wordpress.com/2018/10/07/cve-2018-7631-rce-in-adb-epicentro-7-3-2-httpd/

Trust: 3.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7631

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7631

Trust: 0.8

url:https://fschallock.wordpress.com/2018/10/08/cve-2018-7632-buffer-overflow-in-httpd-in-epicentro-e_7-3-2-allows-attackers-to-cause-a-denial-of-service-attack-remotely-via-a-specially-crafted-get-request/

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7632>

Trust: 0.1

url:https://fschallock.wordpress.com/2018/10/08/cve-2018-7633-script-injection-in-the-login-form-language-parameter-of-adb-firmware-epicentro-7-3-2/

Trust: 0.1

url:https://fschallock.wordpress.com/2018/10/07/cve-2018-7631-rce-in-adb-epicentro-7-3-2-httpd/>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7632

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7633

Trust: 0.1

url:https://fschallock.wordpress.com/2018/10/08/cve-2018-7633-script-injection-in-the-login-form-language-parameter-of-adb-firmware-epicentro-7-3-2/>

Trust: 0.1

url:https://fschallock.wordpress.com/2018/10/08/cve-2018-7632-buffer-overflow-in-httpd-in-epicentro-e_7-3-2-allows-attackers-to-cause-a-denial-of-service-attack-remotely-via-a-specially-crafted-get-request/>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7633

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7633>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7632

Trust: 0.1

sources: CNVD: CNVD-2018-20873 // JVNDB: JVNDB-2018-011655 // PACKETSTORM: 149976 // CNNVD: CNNVD-201810-487 // NVD: CVE-2018-7631

CREDITS

Felix Schallock

Trust: 0.1

sources: PACKETSTORM: 149976

SOURCES

db:CNVDid:CNVD-2018-20873
db:JVNDBid:JVNDB-2018-011655
db:PACKETSTORMid:149976
db:CNNVDid:CNNVD-201810-487
db:NVDid:CVE-2018-7631

LAST UPDATE DATE

2024-11-23T21:52:40.496000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-20873date:2018-10-15T00:00:00
db:JVNDBid:JVNDB-2018-011655date:2019-01-18T00:00:00
db:CNNVDid:CNNVD-201810-487date:2018-10-10T00:00:00
db:NVDid:CVE-2018-7631date:2024-11-21T04:12:26.253

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-20873date:2018-10-15T00:00:00
db:JVNDBid:JVNDB-2018-011655date:2019-01-18T00:00:00
db:PACKETSTORMid:149976date:2018-10-26T23:22:22
db:CNNVDid:CNNVD-201810-487date:2018-10-10T00:00:00
db:NVDid:CVE-2018-7631date:2018-10-09T22:29:01.750