Arescom NetDSL-1000 telnetd DoS

From: Pim van Riezen (piat_private)
Date: Sat Feb 09 2002 - 00:32:11 PST

  • Next message: jlewisat_private: "RE: Intel.com Mailing List Arbitrary Address Removal Link"

    BACKGROUND
    
    The Arescom NetDSL-1000 series of dsl routers is in common use by a number
    of dsl providers. It offers connectivity to the dsl circuit through
    ethernet and USB. They are intended to be delivered to dsl customers as
    pre-configured black boxen, customers don't get to know the configuration
    password.
    
    THE PROBLEM
    
    The router leaves a telnet-port open for the ISP to reconfigure the router
    if the need arises. The software serving this telnet port is not aware of
    actual sessions: The telnet connection gets wired in software directly to
    something behaving more like a serial console. When you connect to it, it
    asks for a configuration password. If you pass it a long string (say the
    good old 'a'x256) the login system will break this request in a couple of
    shorter chunks and interpret each of these chunks as a separate attempt to
    log in. After three or so failures, the telnet connection is closed off.
    
    If you reconnect after such a failure and used these long strings, you can
    see the login system continuing the parsing of your previous password
    attempt, immediately throwing a couple more login failures to your screen
    even before you type anything.
    
    THE VULNERABILITY
    
    If you flood the telnet configuration a couple dozen times with long
    strings, eventually the telnetd service flat out dies. Routing functions
    of the NetDSL continue to work fine as before. It is unknown whether only
    the telnetd service is affected, other means of remote configuration may
    have become unavailable as well.
    
    THE SOLUTION
    
    Depending on which side of the NetDSL router you are on, this DoS
    vulnerability is either a liability or a benefit. From the customer point
    of view, having the router unavailable for remote probing and
    configuration by the ISP could be considered a Good Thing. Obviously, dsl
    providers have other priorities. No solution beyond powerflipping the
    NetDSL have been found.
    
    Cheers,
    Pi
    
    -- 
       Remember:   KING
         KONG Died for                  http://nexus.madscience.nl/pim/
           your Sins
    



    This archive was generated by hypermail 2b30 : Sat Feb 09 2002 - 13:01:45 PST