Prompt

You have not logged in or are not authorized!

Remember my choice for next time?

News Start

Security Advisory-Stack Overflow Vulnerabilities in SNMPv3 debugging mode
SA No: Huawei-SA-20130313-01
Initial Release Date: 13-03-2013
Last Release Date: 03-05-2013

Summary

Simple Network Management Protocol version 3(SNMPv3) is provided by Huawei for network and device management.

While the SNMPv3 is enable and debugging is turn on, attackers can make stack overflow by sending malformed SNMPv3 messages with shellcode encoded, and attack vulnerable equipment remotely. (Vulnerability ID: HWNSIRT-2013-0219)

These vulnerabilities were first reported by Roberto Paleari of Emaze Networks S.p.A. Huawei would like to thank Roberto Paleari and Emaze Networks S.p.A for reporting these issues and for working with us to help protect the security of our customers.

Currently, workarounds are available and fixed version has been provided.

More version information are detailed below.

Affected Products

Router series products

AR 150/200/1200/2200/3200

V200R001, V200R002, V200R003

Impact

When the debugging is turn on, attackers can execute injected arbitrary commands on the device by exploiting the vulnerability.

Vulnerability Scoring Details

The vulnerability classification has been performed by using the CVSSv2 scoring system

(http://www.first.org/cvss/).

Base Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)

Temporal Score: 6.5 (E:F/RL:T/RC:C)

Overall Score: 6.5

Technique Details

Following conditions must be satisfied:

1. SNMPv3 is enable.

2. The SNMPv3 module debugging is turn on. (By default, The debugging is turn off).

3. The IP address of the vulnerable equipment is reachable.

Vulnerability details:

When parsing SNMPv3 messages and printing debugging information, The checking of information copy is not enough and the stack overflow maybe occur, resulting in attacking remotely.

Temporary Fix

Workarounds: Connect to the device using SSH and turn off the debugging of SNMPv3. The detailed configuration is as follows(In the case of AR Router):

[Quidway]undo debugging snmp-agent header

Software Versions and Fixes

Solution:

The overflow vulnerabilities are fixed by checking the related data copy in SNMPv3 debugging module.

Product name

Solved version

Solved time

AR 150/200/1200/2200/3200

Patch ARV200R002SPC006 for V200R002C01SPC200, V200R002C02SPC200 and V200R002C02SPC300

Released

 

V200R003C01SPC100

Released


Obtaining Fixed Software

Customers should contact Huawei TAC (Huawei Technical Assistance Center) to request the upgrades, or obtain them through Huawei worldwide website at http://support.huawei.com/support/. For TAC contact information, please refer to Huawei worldwide website at

http://support.huawei.com/enterprise/NewsReadAction.action?contentId=NEWS1000000563.

Exploitation and Vulnerability Source

This vulnerability is reported by Roberto Paleari of Emaze Networks S.p.A. Huawei PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory.

Contact Channel for Technique Issue

For security problems about Huawei products and solutions, please contact PSIRT@huawei.com.

For general problems about Huawei products and solutions, please directly contact Huawei TAC (Huawei Technical Assistance Center) to request the configuration or technical assistance.

Revision History

2013-3-13 V1.0 INITIAL

2013-3-22 V1.1 UPDATED update the affected version

2013-5-3 V1.2 UPDATED update the affected version

Declaration

This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, either express or implied, including the warranties of merchantability or fitness for a particular purpose. In no event shall Huawei Investment & Holding Co., Ltd. or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. Huawei is entitled to amend or update this document from time to time.

Huawei Security Procedures

Complete information on providing feedback on security vulnerability of Huawei products, getting support for Huawei security incident response services, and obtaining Huawei security vulnerability information, is available on Huawei's worldwide website at http://www.huawei.com/en/security/psirt/.

News End