UPnP is "Universal Plug 'n Play", which is a Service on XP and should be disabled. I don't use DLink anymore so I didn't read about it, but this is probably not a vulnerability if UPnP is disabled. DLink's site may not even mention it. -Clint
TITLE: D-Link Routers UPnP M-SEARCH Request Buffer Overflow SECUNIA ADVISORY ID: SA21081 VERIFY ADVISORY: http://secunia.com/advisories/21081/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network OPERATING SYSTEM: D-Link DI-524 http://secunia.com/product/8028/ D-Link DI-604 Broadband Router http://secunia.com/product/11068/ D-Link DI-624 http://secunia.com/product/3660/ D-Link DI-784 http://secunia.com/product/8029/ D-Link EBR-2310 Ethernet Broadband Router http://secunia.com/product/11069/ D-Link WBR-1310 Wireless G Router http://secunia.com/product/11070/ D-Link WBR-2310 RangeBooster G Router http://secunia.com/product/11071/ DESCRIPTION: eEye Digital Security has reported a vulnerability in various D-Link routers, which can be exploited by malicious people to compromise a vulnerable network device. The vulnerability is caused due to a boundary error in the UPnP service when processing "M-SEARCH" requests. This can be exploited to cause a stack-based buffer overflow by sending an "M-SEARCH" request with an overly long string (about 800 bytes) to port 1900/UDP. Successful exploitation allows execution of arbitrary code. SOLUTION: Updates are available for download from the D-Link web site. ORIGINAL ADVISORY: eEye Digital Security: http://www.eeye.com/html/research/advisories/AD20060714.html ============= PCWorks Mailing List ================= Don't see your post? Check our posting guidelines & make sure you've followed proper posting procedures, http://pcworkers.com/rules.htm Contact list owner <[EMAIL PROTECTED]> Unsubscribing and other changes: http://pcworkers.com =====================================================
