• February 21, 2020, 12:03:23 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: CVE-2019-10999 :: Authenticated Buffer Overflow (Various DCS Cameras)  (Read 972 times)

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 48359
  • D-Link Global Forum Moderator
    • Router Troubleshooting

Affected Models:
DCS-930L / 931L / 932L / 933L / 934L / 5009L/ 5010L / 5020L / 5025L / 5030L

Overview:
In November 28, 2018, D-Link became a aware of a 3rd Party security researcher that accused the DCS-5020L Hardware Rev. Ax of a command injection vulnerability in the web-GUI.
After an investigation, this vulnerability is only accessible via the local-network since the cameras Web-GUI only responds on the same subnet was the PC Host web-browser. and not directly from the Internet (WAN-side))
CVE-2019-10999 :: https://nvd.nist.gov/vuln/detail/CVE-2019-10999
Github :: https://github.com/fuzzywalls/CVE-2019-10999
Onward Security :: http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201905-138

Details:
Note: The exploit requires credentials to be successful.
There exists an authenticated buffer overflow vulnerability in the accused cameras  that can be exploited by malicious users. It occurs when a large string is passed in the WEPEncryption parameter provided to wireless.htm. The variable is expected to be a single character of some value between 0 and 4 based on radio buttons selected by the user. Because of this assumption the length of the string is never verified and passed directly to strcpy() which copies directly to a stack variable. This overwrite can be used to gain control of the return address and possible to execute arbitrary code.

Links to updated FW files per DCS model here:
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10114
Logged
"Nothing Funny about It...." We are not here to Impress anyone! You have a be a COMPETENT user first to under stand COMPETENT help!