KCodes NetUSB buffer overflow

22 maggio, 2015

A vulnerability has been found in KCodes NetUSB which is a Linux kernel module that enables several users on a local network to share USB-based services over IP. The vulnerability in question, CVE-2015-3036, is a buffer overflow that could enable an attacker to either crash the device running the kernel module, or in some cases, remotely run code.

 

Upon researching our product-line source code we have identified the legacy model DIR-685 as being affected. Please see below for patch update information
 

References

  

Stefan Viehbock :: Link :: Initially April 10, 2015

 

CERT :: VU#177092 :: Link :: Disclosed May 19, 2015

 

Description

 

Referencing : VU#177092

KCodes NetUSB is a Linux kernel module that provides USB over IP. It is used to provide USB device sharing on a home user network.

 

CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') - CVE-2015-3036

According to the reporter, computer client data provided when connecting to the NetUSB server is not properly validated by the driver before processing, resulting in a buffer overflow that may lead to a denial of service or code execution. More information can be found in SEC Consult's advisory.
 

Recommendations

 

Check router device history for any unauthorised access.

 

All devices on your network should have log-in credentials and if your network has Wi-Fi, please make sure Wi-Fi encryption-keys are enabled. Also for devices that cannot notify the owner of a new software updates, check for updates from the devices manufacturer.

 

Immediately update to the fixed firmware referenced in the table below as they are made available. Please continue to monitor this page for further updates and disclosures.

 

D-Link recommends that your D-Link router remote network management feature be disabled (factory default is disabled) to mitigate a malicious remote user using this vulnerability to exploit your router.  If remote network management is disabled, a malicious user would require to be on the local network side of the router or have compromised another device on the network that could be used to attack the router.

 

D-Link recommends that all PCs (Window or Mac) be up-to-date and scanned for virus, bots, or other damaging software that could compromise the network they are connected.

 

Wi-Fi encryption reduces the risk to this vulnerability if the device Web-GUI is accessed over Wi-Fi. If Wi-Fi network was encrypted, the malicious user would also need to compromise the Wi-Fi encryption, or PC using the Web-GUI utility, in order to monitor the traffic and intercept the cookie. 

 

The default configuration of D-Link's routers is to provide simple installation, ease of usability, and offer widest interoperability. D-Link Europe reminds customers to configure their devices specifically to  and for security concerns within their network infrastructure. In General, D-Link Europe recommends disabling services not being used, changing/securing device log-in credentials, enabling Wi-Fi encryption, monitoring the routers log files, and access-lists for your devices so security risks for your entire network are minimised. 

Affected Product 

Model Name

HW Version

Vulnerable FW Versions

Current FW Versions   (include fixes)

DIR-635

B3

F/W version 2.36 and lower

Rev B3 : Under Development Est. TBA

(Updated: 15/07/2015) 

DIR-655

A4

F/W version 1.36 and lower

Rev A4 : Under Development Est. TBA

(Updated: 15/07/2015) 

DIR-655

B1

F/W version 2.11 and lower

Rev B1 : 2.10B01 beta

(Updated: 15/07/2015) 

DIR-685

A1

F/W version 2.01 and lower

Rev A1 : Under Development Est. 05/08/2015

Updated: 15/07/2015)

DIR-825

A1

F/W version 1.14 and lower

Rev A1 : Under Development Est. TBA

(Updated: 15/07/2015)

DIR-825

B1

F/W version 2.09 and lower

Rev B1 :: 2.10B01 beta

(Updated: 15/07/2015) 

DIR-855

A2

F/W version 1.23 and lower

Rev A2 : Under Development Est. TBA

(Updated: 15/07/2015) 

DAP-1350

A1

F/W version 1.14 and lower

Rev A1 :: 1.15:: Under Development Est. TBA

(Updated: 15/07/2015) 

DSL-3580L

A2

F/W version:All

Rev A2 : Under Development Est. 31/07/2015

(Updated: 15/07/2015) 

DSL-2750B

D1

F/W version: All

Rev D1 : Under Development Est. 31/07/2015

(Updated: 15/07/2015) 

DSL-2751

D1

F/W version:All

Rev D1 : Under Development Est. 31/07/2015

(Updated: 15/07/2015) 

DSL-2770L

A1

F/W version: All

Rev A1 : 1.06 beta

(Updated: 15/07/2015)

 

Security patch for your D-Link Devices

 

These firmware updates address the security vulnerabilities in affected D-Link devices. D-Link will update this continually and we strongly recommend all users to install the relevant updates.

 

As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.