SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Device (Router/Bridge/Hub)  >   NETGEAR Router Vendors:   NETGEAR
NETGEAR DG632 Router Web Interface Can Be Crashed By Remote Users
SecurityTracker Alert ID:  1022403
SecurityTracker URL:  http://securitytracker.com/id/1022403
CVE Reference:   CVE-2009-2256   (Links to External Site)
Updated:  Jul 1 2009
Original Entry Date:  Jun 16 2009
Impact:   Denial of service via network

Version(s): DG632; firmware version 3.4.0_ap
Description:   A vulnerability was reported in the NETGEAR DG632 Router. A remote user can cause denial of service conditions.

A remote user on the local network can send a specially crafted HTTP POST request for '/cgi-bin/firmwarecfg' to cause the target web management service to stop responding. A power reset is required to return the service to normal operation.

A remote user on the WAN interface can exploit this flaw if Remote Management is enabled.

The vendor was notified on June 12, 2009.

Tom Neaves reported this vulnerability.

Impact:   A remote user can cause denial of service conditions on the target web service.
Solution:   No solution was available at the time of this entry.

[Editor's note: The vendor has noted that the vulnerable product has reached end of life.]

Vendor URL:  www.netgear.com/ (Links to External Site)
Cause:   Exception handling error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Mon, 15 Jun 2009 19:37:53 +0100
Subject:  Netgear DG632 Router Remote DoS Vulnerability

Product Name: Netgear DG632 Router
Vendor: http://www.netgear.com
Date: 15 June, 2009
Author: tom@tomneaves.co.uk <tom@tomneaves.co.uk>
Original URL: http://www.tomneaves.co.uk/Netgear_DG632_Remote_DoS.txt
Discovered: 18 November, 2006
Disclosed: 15 June, 2009

I. DESCRIPTION

The Netgear DG632 router has a web interface which runs on port 80.  This
allows an admin to login and administer the device's settings.  However,
a Denial of Service (DoS) vulnerability exists that causes the web interface
to crash and stop responding to further requests.

II. DETAILS

Within the "/cgi-bin/" directory of the administrative web interface exists 
a
file called "firmwarecfg".  This file is used for firmware upgrades.  A HTTP 
POST
request for this file causes the web server to hang.  The web server will 
stop
responding to requests and the administrative interface will become 
inaccessible
until the router is physically restarted.

While the router will still continue to function at the network level, i.e. 
it will
still respond to ICMP echo requests and issue leases via DHCP, an 
administrator will
no longer be able to interact with the administrative web interface.

This attack can be carried out internally within the network, or over the 
Internet
if the administrator has enabled the "Remote Management" feature on the 
router.

Affected Versions: Firmware V3.4.0_ap (others unknown)

III. VENDOR RESPONSE

12 June, 2009 - Contacted vendor.
15 June, 2009 - Vendor responded.  Stated the DG632 is an end of life 
product and is no
longer supported in a production and development sense, as such, there will 
be no further
firmware releases to resolve this issue.

IV. CREDIT

Discovered by Tom Neaves 

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC