Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:15646
HistoryJan 09, 2007 - 12:00 a.m.

Packeteer PacketWise CLI overflow DoS

2007-01-0900:00:00
vulners.com
13

Product: Packeteer PacketShaper
Model: 9500/ISP
Software: PacketWise 8.x (possibly others)

===========
Background

Packeteer creates bandwidth management solutions such as the PacketShaper which "is the ultimate scalable platform for optimized WAN application performance—the only all-in-one solution for extending monitoring, shaping, acceleration and compression as well as centralized reporting and management across the distributed enterprise."

===========
Description

The Packeteer PacketShaper appears to be vulnerable to a buffer overflow which can be triggered by a valid command followed by a long argument (around 1500 bytes).

class show /Inbound/AAAAA…

There appear to be other places where such behavior can be seen, e.g. via the web interface:

https://xx.xx.xx.xx/clastree.htm?POLICY=/Inbound/Filesharing/BitTorrent/AAAAA

Both of these examples require either "look" or "touch" access to the device.

===========
Impact

The watchdog timer will trigger a unit reset/reboot, which takes around 30 seconds. If there is no bypass mechanism in place (e.g. fiber bypass switch), service will be interrupted.

Packeteer has not responded to the initial reports.