Re: Accesspoints disclose wep keys, password and mac filter (fwd)

From: informatik.koerferat_private
Date: Thu Nov 07 2002 - 09:29:06 PST

  • Next message: Andy Polyakov: "Re: When scrubbing secrets in memory doesn't work"

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <20021106185730.15557.qmailat_private>
    
    >>        Possibly vulnerable, not tested, OEM Version from GlobalSunTech:
    >>                D-Link DWL-900AP+ B1 version 2.1 and 2.2
    >>                ALLOY GL-2422AP-S
    >>                EUSSO GL2422-AP
    >>                LINKSYS WAP11-V2.2
    >
    >The D-Link DWL-900AP+ B1 2.1 isn't affected.
    >
    
    I'm sorry, this device IS vulnerable, I believe ALL others are as well.
    The source code posted is only a proof of concept, slight modifications
    will deliver the correct result.
    
    Mainly the data returned by the "gstsearch" packet has EOF's or EOL's
    in it, so parsing will lead to an abort, before the desired data is
    delivered.
    
    The worst is, that an attacker is actually able to save these returned
    values back to the WAP using the string "gstset" (not quite sure if this
    is the correct string, because I'm at work and don't have the infos here,
    but it is possible!) followed by the data.
    
    NOTE:
    The answer of the access point is a broadcast message as well,
    so every computer in the subnet would be able to receive the
    data.
    



    This archive was generated by hypermail 2b30 : Thu Nov 07 2002 - 21:59:46 PST