UPnP is "Universal Plug 'n Play", which is a Service on XP and 
should be disabled.  I don't use DLink anymore so I didn't read 
about it, but this is probably not a vulnerability if UPnP is 
disabled.  DLink's site may not even mention it.
-Clint


TITLE:
D-Link Routers UPnP M-SEARCH Request Buffer Overflow

SECUNIA ADVISORY ID:
SA21081

VERIFY ADVISORY:
http://secunia.com/advisories/21081/

CRITICAL:
Moderately critical

IMPACT:
System access

WHERE:
>From local network

OPERATING SYSTEM:
D-Link DI-524
http://secunia.com/product/8028/
D-Link DI-604 Broadband Router
http://secunia.com/product/11068/
D-Link DI-624
http://secunia.com/product/3660/
D-Link DI-784
http://secunia.com/product/8029/
D-Link EBR-2310 Ethernet Broadband Router
http://secunia.com/product/11069/
D-Link WBR-1310 Wireless G Router
http://secunia.com/product/11070/
D-Link WBR-2310 RangeBooster G Router
http://secunia.com/product/11071/

DESCRIPTION:
eEye Digital Security has reported a vulnerability in various 
D-Link routers, which can be exploited by malicious people to 
compromise a vulnerable network device.

The vulnerability is caused due to a boundary error in the UPnP 
service when processing "M-SEARCH" requests. This can be 
exploited to cause a stack-based buffer overflow by sending an 
"M-SEARCH" request with an overly long string (about 800 bytes) 
to port 1900/UDP.

Successful exploitation allows execution of arbitrary code.

SOLUTION:
Updates are available for download from the D-Link web site.

ORIGINAL ADVISORY:
eEye Digital Security:
http://www.eeye.com/html/research/advisories/AD20060714.html
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to