[Wien] VULN] Mikrotik RouterOS sshd (ROSSSH) - Remote Preauth Heap Corruption

L. Aaron Kaplan (spam-protected)
Di Sep 3 20:07:09 CEST 2013


Das koennte hier einige interessieren. Bei uns im Netz gibt es ein paar Mikrotiks.


Begin forwarded message:

> 
> http://www.exploit-db.com/exploits/28056/
> 
> Mikrotik RouterOS sshd (ROSSSH) - Remote Preauth Heap Corruption
> 
> During an audit the Mikrotik RouterOS sshd (ROSSSH) has been identified
> to have a remote previous to authentication heap corruption in its sshd
> component.
> 
> Exploitation of this vulnerability will allow full access to the router
> device.
> 
> This analysis describes the bug and includes a way to get developer
> access to recent versions of Mikrotik RouterOS
> using the /etc/devel-login file. This is done by forging a modified NPK
> file using a correct signature and logging
> into the device with username ‘devel’ and the password of the
> administrator. This will drop into a busybox shell for
> further researching the sshd vulnerability using gdb and strace tools
> that have been compiled for the Mikrotik busybox
> platform.
> 
> Shodanhq.com shows >290.000 entries for the ROSSSH search term.
> 
> The 50 megs Mikrotik package including the all research items can be
> downloaded here:
> 
> http://www.farlight.org/mikropackage.zip
> http://www.exploit-db.com/sploits/28056.zip

-------------- nächster Teil --------------
Ein Dateianhang mit Binärdaten wurde abgetrennt...
Dateiname   : signature.asc
Dateityp    : application/pgp-signature
Dateigröße  : 203 bytes
Beschreibung: Message signed with OpenPGP using GPGMail
URL         : <http://lists.funkfeuer.at/pipermail/wien/attachments/20130903/3b2c93ed/attachment.sig>
-------------- nächster Teil --------------
--
Wien mailing list
(spam-protected)
https://lists.funkfeuer.at/mailman/listinfo/wien


Mehr Informationen über die Mailingliste Wien