![]() ![]() The company says that this overflow can be exploited toĮnable both denial of service (crashing the router) and remote code The client computer if this name is longer than 64 bytes, the buffer As part of theĬommunication between client and server, the client sends the name of Linux driver contains a simple buffer overflow. Vulnerability Lab, which publicized the problem, discovered that the It's this driver that contains a major security flaw. This router-side driver listens to connections on TCP port 20005, and On the plus side, I guess, if this is an attack the person or program that knocks out your router has a slight sense of humor, spoofing an IP address of Symantec as the attack source.Īrs has some more technical details on the vulnerability. Sometimes consumer-grade router makers will act responsibly and do so. You can try the check-for-updates capability wherever in exists in the UI there and see if Netgear has released a firmware update that patches the flaw/s. (Or if you were to capture some of that future traffic with a packet sniffer like Wireshark.) If the suspicious traffic reoccurs and your router immediately suffers subsequent issues, obviously the cause could then be known with more certainty. Without further log details of what was actually in the packets of the suspicious traffic, details that aren't going to be in a consumer-grade router's logs, it's perhaps impossible to say for sure. ![]() Now, to be clear this is just a suspicion it's possible the unusual attack traffic (unusual to your router, at least) might just have coincidentally arrived about the time that your 2.4 network had its crash-like event. (The full list of routers believed to be affected is in that Gizmodo article.) Used to crash the router, using denial of service of attacks, and evenĪccording to Ars Technica & the vulnerability testers who caught the bug, it's present in both WNDR v1 & WNDR v2. The researchers claim that the simple overflow can be ![]() Sadly, the driver contains an error known as a buffer overflow, whichĬan occur when a device sends its name to the router and it’s longer The driver, as its name suggests, is installed on routers to allowĬomputers to access USB devices over a network. Techinca refers to as “amateurish,” in a driver referred to as NetUSB. SEC Consult Vulnerability Lab has discovered the flaw, which Ars I have a distinct suspicion of what the cause of your semi-crash might be. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |