D-Link Forums

The Graveyard - Products No Longer Supported => Routers => DIR-879 => Topic started by: GreenBay42 on November 29, 2017, 08:39:50 AM

Title: Security Advisement - Firmware 1.06B01 Released
Post by: GreenBay42 on November 29, 2017, 08:39:50 AM
Seven flaws have been patched. The seven flaws include three that can be exploited to perform remote code execution, three more that can be used in denial of service attacks, and one information-leaking blunder. The full list of flaws is as follows:

CVE-2017-14491 Remote code execution in the DNS subsystem that can be exploited from the other side of the internet against public-facing systems and against stuff on the local network. The previously latest version had a two-byte overflow bug, which could be leveraged, and all prior builds had an unlimited overflow.

CVE-2017-14492 The second remote code execution flaw works via a heap-based overflow.

CVE-2017-14493 Google labels this one as trivial to exploit. It's a stack-based buffer overflow vulnerability that enables remote code execution if it's used in conjunction with the flaw below.

CVE-2017-14494 This is an information leak in DHCP which, when using in conjunction with CVE-2017-14493, lets an attacker bypass the security mechanism ASLR and attempt to run code on a target system.

CVE-2017-14495 A limited flaw this one, but can be exploited to launch a denial of service attack by exhausting memory. Dnsmasq is only vulnerable, however, if the command line switches --add-mac, --add-cpe-id or --add-subnet are used.

CVE-2017-14496 Here the DNS code performs invalid boundary checks, allowing a system to be crashed using an integer underflow leading to a huge memcpy() call. Android systems are affected if the attacker is local or tethered directly to the device.

CVE-2017-13704 A large DNS query can crash the software.

Download Firmware - ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-879/REVA/DIR-879_REVA_FIRMWARE_PATCH_v1.06B01.zip (ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-879/REVA/DIR-879_REVA_FIRMWARE_PATCH_v1.06B01.zip)
Title: Re: Security Advisement - Firmware 1.06B01 Released
Post by: barboose on November 30, 2017, 12:39:04 PM
I can't use this security patch because firmware has PPPoE bug. I wrote bug details under the following topic: http://forums.dlink.com/index.php?topic=72462.0 (http://forums.dlink.com/index.php?topic=72462.0)
I created bug ticket but the regional (Hungarian) D-Link support has not given an answer so far.

Seven flaws have been patched. The seven flaws include three that can be exploited to perform remote code execution, three more that can be used in denial of service attacks, and one information-leaking blunder. The full list of flaws is as follows:

CVE-2017-14491 Remote code execution in the DNS subsystem that can be exploited from the other side of the internet against public-facing systems and against stuff on the local network. The previously latest version had a two-byte overflow bug, which could be leveraged, and all prior builds had an unlimited overflow.

CVE-2017-14492 The second remote code execution flaw works via a heap-based overflow.

CVE-2017-14493 Google labels this one as trivial to exploit. It's a stack-based buffer overflow vulnerability that enables remote code execution if it's used in conjunction with the flaw below.

CVE-2017-14494 This is an information leak in DHCP which, when using in conjunction with CVE-2017-14493, lets an attacker bypass the security mechanism ASLR and attempt to run code on a target system.

CVE-2017-14495 A limited flaw this one, but can be exploited to launch a denial of service attack by exhausting memory. Dnsmasq is only vulnerable, however, if the command line switches --add-mac, --add-cpe-id or --add-subnet are used.

CVE-2017-14496 Here the DNS code performs invalid boundary checks, allowing a system to be crashed using an integer underflow leading to a huge memcpy() call. Android systems are affected if the attacker is local or tethered directly to the device.

CVE-2017-13704 A large DNS query can crash the software.

Download Firmware - ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-879/REVA/DIR-879_REVA_FIRMWARE_PATCH_v1.06B01.zip (ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-879/REVA/DIR-879_REVA_FIRMWARE_PATCH_v1.06B01.zip)
Title: Re: Security Advisement - Firmware 1.06B01 Released
Post by: FurryNutz on December 01, 2017, 12:04:46 PM
I would contact your regional D-Link support office on the phone instead of email ticket. This needs to be addressed by your regional D-Link office.

I can't use this security patch because firmware has PPPoE bug. I wrote bug details under the following topic: http://forums.dlink.com/index.php?topic=72462.0 (http://forums.dlink.com/index.php?topic=72462.0)
I created bug ticket but the regional (Hungarian) D-Link support has not given an answer so far.

Seven flaws have been patched. The seven flaws include three that can be exploited to perform remote code execution, three more that can be used in denial of service attacks, and one information-leaking blunder. The full list of flaws is as follows:

CVE-2017-14491 Remote code execution in the DNS subsystem that can be exploited from the other side of the internet against public-facing systems and against stuff on the local network. The previously latest version had a two-byte overflow bug, which could be leveraged, and all prior builds had an unlimited overflow.

CVE-2017-14492 The second remote code execution flaw works via a heap-based overflow.

CVE-2017-14493 Google labels this one as trivial to exploit. It's a stack-based buffer overflow vulnerability that enables remote code execution if it's used in conjunction with the flaw below.

CVE-2017-14494 This is an information leak in DHCP which, when using in conjunction with CVE-2017-14493, lets an attacker bypass the security mechanism ASLR and attempt to run code on a target system.

CVE-2017-14495 A limited flaw this one, but can be exploited to launch a denial of service attack by exhausting memory. Dnsmasq is only vulnerable, however, if the command line switches --add-mac, --add-cpe-id or --add-subnet are used.

CVE-2017-14496 Here the DNS code performs invalid boundary checks, allowing a system to be crashed using an integer underflow leading to a huge memcpy() call. Android systems are affected if the attacker is local or tethered directly to the device.

CVE-2017-13704 A large DNS query can crash the software.

Download Firmware - ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-879/REVA/DIR-879_REVA_FIRMWARE_PATCH_v1.06B01.zip (ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-879/REVA/DIR-879_REVA_FIRMWARE_PATCH_v1.06B01.zip)