Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19474
HistoryMar 22, 2008 - 12:00 a.m.

Buffer-overflow in ASUS Remote Console 2.0.0.24

2008-03-2200:00:00
vulners.com
6

#######################################################################

                         Luigi Auriemma

Application: ASUS Remote Console
http://www.asus.com/999/html/share/9/icon/9/index.htm#asmb3
Versions: <= 2.0.0.24
Platforms: Windows
Bug: buffer overflow
Exploitation: remote
Date: 21 Mar 2008
Author: Luigi Auriemma
e-mail: [email protected]
web: aluigi.org

#######################################################################

1) Introduction
2) Bug
3) The Code
4) Fix

#######################################################################

===============
1) Introduction

From the manual:
"The ASUS Remote Console (ARC) is an efficient and flexible application
that allows monitoring and control of the remote host."

The main component of this service is a telnet server listening on port
623 which is called DpcProxy and provides an IPMI interface.

#######################################################################

======
2) Bug

The DPC Proxy is affected by a buffer-overflow vulnerability located in
the function which gets the data received from the client, stores them
in a stack buffer of about 1024 bytes and checks the presence of an end
of line delimiter (carriage return).

#######################################################################

===========
3) The Code

http://aluigi.org/poc/asuxdpc.txt

nc SERVER 623 -v -v -w 2 < asuxdpc.txt

#######################################################################

======
4) Fix

No fix

#######################################################################


Luigi Auriemma
http://aluigi.org