D-Link Forums

The Graveyard - Products No Longer Supported => Routers / COVR => DIR-850L => Topic started by: GreenBay42 on November 16, 2017, 09:25:58 AM

Title: DIR-850L - Security Firmware Patch - DNSmasq vulnerability (Nov.16)
Post by: GreenBay42 on November 16, 2017, 09:25:58 AM
Firmware v1.21B06 (RevA) and v2.22B02 (revB) have been released. Links at the bottom. Note this is not a KRACK fix.

Before updating this firmware, the previous patch must have been updated on your router or this one will not work.

Please go here first and complete before updating the new patch. --> http://forums.dlink.com/index.php?topic=72539.0 (http://forums.dlink.com/index.php?topic=72539.0)

Rev A - The 1.21B06 package will include 1.15 and 1.20 in the ZIP file. Read the update instructions to help you update to 1.21B06.



Seven flaws have been patched. The seven flaws include three that can be exploited to perform remote code execution, three more that can be used in denial of service attacks, and one information-leaking blunder. The full list of flaws is as follows:

CVE-2017-14491 – Remote code execution in the DNS subsystem that can be exploited from the other side of the internet against public-facing systems and against stuff on the local network. The previously latest version had a two-byte overflow bug, which could be leveraged, and all prior builds had an unlimited overflow.

CVE-2017-14492 – The second remote code execution flaw works via a heap-based overflow.

CVE-2017-14493 – Google labels this one as trivial to exploit. It's a stack-based buffer overflow vulnerability that enables remote code execution if it's used in conjunction with the flaw below.

CVE-2017-14494 – This is an information leak in DHCP which, when using in conjunction with CVE-2017-14493, lets an attacker bypass the security mechanism ASLR and attempt to run code on a target system.

CVE-2017-14495 – A limited flaw this one, but can be exploited to launch a denial of service attack by exhausting memory. Dnsmasq is only vulnerable, however, if the command line switches --add-mac, --add-cpe-id or --add-subnet are used.

CVE-2017-14496 – Here the DNS code performs invalid boundary checks, allowing a system to be crashed using an integer underflow leading to a huge memcpy() call. Android systems are affected if the attacker is local or tethered directly to the device.

CVE-2017-13704 – A large DNS query can crash the software.

Rev A - ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-850L/REVA/DIR-850L_REVA_FIRMWARE_PATCH_v1.21B06.zip (ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-850L/REVA/DIR-850L_REVA_FIRMWARE_PATCH_v1.21B06.zip)

Rev B - ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-850L/REVB/DIR-850L_REVB_FIRMWARE_PATCH_v2.22B02.zip (ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-850L/REVB/DIR-850L_REVB_FIRMWARE_PATCH_v2.22B02.zip)


Title: Re: DIR-850L - Security Firmware Patch - DNSmasq vulnerability (Nov.16)
Post by: dbceee on August 31, 2018, 06:15:55 AM
Can this patch described in your post be used with the DIR-822 router?
Title: Re: DIR-850L - Security Firmware Patch - DNSmasq vulnerability (Nov.16)
Post by: FurryNutz on August 31, 2018, 06:44:48 AM
No it can not.
The 822 FW is still being worked on:
https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10077 (https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10077)

Can this patch described in your post be used with the DIR-822 router?