Advisory Details

September 2nd, 2015

(0Day) ASUS TM-AC1900 httpd Stack Buffer Overflow Remote Code Execution Vulnerability

ZDI-15-409
ZDI-CAN-3035

CVE ID CVE-2015-6949
CVSS SCORE 7.9, AV:A/AC:M/Au:N/C:C/I:C/A:C
AFFECTED VENDORS ASUS
AFFECTED PRODUCTS TM-AC1900
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the ASUS TM-1900. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the HTTP header parsing routine. The issue lies in the failure to check the size of header values. An attacker could leverage this vulnerability to execute code within the context of root.

ADDITIONAL DETAILS


This vulnerability is being disclosed publicly without a patch in accordance with the ZDI vulnerability disclosure policy on lack of vendor response.

07/09/2015 - ZDI emailed ASUS requested contact
07/28/2015 - ZDI emailed ASUS requested contact
08/13/2015 - ZDI emailed ASUS requested contact
08/21/2015 - ZDI emailed ASUS requested contact

-- Mitigation:
Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the service to trusted machines. Only the clients and servers that have a legitimate procedural relationship with the service should be permitted to communicate with it. This could be accomplished in a number of ways, most notably with firewall rules/whitelisting.


DISCLOSURE TIMELINE
  • 2015-05-05 - Vulnerability reported to vendor
  • 2015-09-02 - Coordinated public release of advisory
CREDIT Elvis Collado - HP DVLabs
BACK TO ADVISORIES