Realtek APRouter SDK Advisory CVE-2021-35392~35395(buffer_overflow_vulnerabilities)

Realtek AP-Router SDK Advisory

(CVE-2021-35392/CVE-2021-35393/CVE-2021-35394/CVE-2021-35395)

Release Date

2021/08/15

Affected Projects

Realtek AP-Router SDK

Affected Versions

rtl819x-SDK-v3.2.x Series
rtl819x-SDK-v3.4.x Series
rtl819x-SDK-v3.4T Series
rtl819x-SDK-v3.4T-CT Series
rtl819x-eCos-v1.5.x Series

CVE ID

CVE-2021-35392
CVE-2021-35393
CVE-2021-35394
CVE-2021-35395

Description

On some Realtek Jungle SDK based routers, potential memory corruption vulnerabilities in some
services may cause their denial of the service.

CVE-2021-35392/CVE-2021-35393

The ‘WiFi Simple Config’ server (wscd) that implements both UPnP and SSDP protocols is
vulnerable to a stack buffer overflow (CVE-2021-35393) due to unsafe parsing of the UPnP
SUBSCRIBE/UNSUBSCRIBE Callback header, and also a heap buffer overflow (CVE-2021-35392)due to unsafe crafting of SSDP NOTIFY messages from received M-SEARCH message’s ST header.

CVE-2021-35394

The ‘UDPServer’ MP tool is affected by multiple buffer overflow vulnerabilities and an arbitrary
command injection vulnerability, due to insufficient legality detection on commands received from
clients.

CVE-2021-35395

The HTTP web server ‘boa’ (go-ahead has been obsoleted) is vulnerable to multiple buffer overflows due to unsafe copies of some overly long parameters submitted in the form, such as
- unsafe copy of ‘submit-url’ parameter in formRebootCheck/formWsc/formWlanMultipleAP
- unsafe copy of ‘ifname’ parameter in formWlSiteSurvey
- unsafe copy of ‘hostname’ parameter in formStaticDHCP
- unsafe copy of ‘peerPin’ parameter in formWsc


The root cause of the above vulnerabilities is insufficient validation on the received buffer, and unsafe calls to sprintf/strcpy. An attack can exploit the vulnerabilities by crafting arguments in a specific request, and a successful exploit would cause the server to crash and deny service.

Vulnerability Type

Buffer Overflow

Attack Type

Network

Access Vector

Crafting overly long or invalid arguments in a specific request.

Security Risk

High

Patch

CVE-2021-35392/CVE-2021-35393/CVE-2021-35394

20210622_sdk_3.2.3_wsc_binary_and_mp_daemon_patch.tar.gz
20210622_sdk_3.4.11E_wsc_binary_and_mp_daemon_patch.tar.gz
20210705_sdk-v3.4t_pre5_wsc_binary_and_mp_daemon_patch.tar.gz
20210622_sdk-v3.4t_pre7_wsc-upnp-mp.tgz
0210701_ecosV1.5.3_patch_for_fixing_vulnerabiits.tar.gz

CVE-2021-35395

20210608_release_v3.2.3_patch_for_fix_buffer_overflow_of_boa.tar.gz
20210608_release_v3.4.11_patch_for_fix_buffer_overflow_of_boa.tar.gz
20210608_release_v3.4T-CT_patch_for_fix_buffer_overflow_of_boa.tar.gz
20210701_ecosV1.5.3_patch_for_fixing_vulnerabiits.tar.gz

Realtek is a trademark of Realtek Semiconductor Corporation Other trademarks or registered trademarks mentioned in this release are the intellectual property of their respective owners.
 

sdk-3.4.4b漏洞修改

[Realtek sdk-3.4.14b]buffer_overflow_vulnerabilities(CVE-2021-35392~35395) patch_wgl307293845的博客-CSDN博客

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

wellnw

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值