LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-30-2013, 02:30 AM   #1
alpha645
LQ Newbie
 
Registered: Jul 2006
Posts: 25

Rep: Reputation: 0
Probable remote UPNP vulnerability's reported, router listed: what to do?


Rapid7 reports a research finding that many many routers are prone to remote (i.e. from the internet) attacks.

There are roughly two classes of routers:
- Those that use libupnp from Intel. These issue's are fixed in recent days. Version 1.6.18 is patched for all known vulnerability's. This first patched version was released yesterday (29-01-13)(!).
- Those that use MiniUPnP. But the latest flaws have been fixed in version 1.4 which was released at 30-10-2009. Furthermore, there are also SOAP vulnerability's in miniupnpd 1.0 and below, here. Miniupnpd 1.1 was released at 25-04-2008.

Both pieces of software run as root and are (somewhat) remote exploitable. This worries me.

The thing is, my device is listed at the second list (miniupnp, not SOAP). However, I checked the device and it says for miniupnpd:

/usr/sbin/miniupnpd -i nas0 -a 10.xxx.xxx.xxx -p 5000 -U

I am not able to determine the version. However, wouldn't it just suffice to say:
- block inbound udp port 5000
- enable UPNP
- all is well

And I'm inclined to say this would suffice. Slashdot posters have made critical statements as to how reliable the results and lists are derived.

For example, you have to spoof an IP as well. But I'm running non-default ip subnet (10.0.0.0/8) in my home network.

Thoughts?
 
Old 01-30-2013, 03:51 AM   #2
displace
Member
 
Registered: Jan 2013
Location: EU
Distribution: Debian
Posts: 268

Rep: Reputation: 25
I just recently picked up the same story on Slashdot. Some scary stuff.

As far as I understand that attack, the router has to be responding with UPnP on a network where the attacker is located - this will most likely be the internet itself. If your router isn't configured to respond to UPnP on an external interface you should be fine. Although I've heard of some attacks where an attacker can trick a user on an internal NAT-ted network to forward some packets to a router, but that's another story. If you're worried you can disable upnp completely, if you don't need it and wait for a firmware update.
 
Old 01-30-2013, 03:59 AM   #3
alpha645
LQ Newbie
 
Registered: Jul 2006
Posts: 25

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by displace View Post
I just recently picked up the same story on Slashdot. Some scary stuff.
Yeah, most of the CVE's mentioned are just for tracking old vulnerability bugs (especially in miniupnp). The fact that it's on Slashdot now makes it scary, but even more scarrier for the fact that some vulnerability's exist for four (4!) years!

Quote:
Originally Posted by displace View Post
As far as I understand that attack, the router has to be responding with UPnP on a network where the attacker is located - this will most likely be the internet itself. If your router isn't configured to respond to UPnP on an external interface you should be fine.
Those were my thoughts exactly. Therefore, I find it hard to believe that my router is listed. I cannot believe that Netgear would install daemons for UPNP and attach it to every interface. Therefore, I have the suspicion this is a severely overstated issue.

Quote:
Originally Posted by displace View Post
Although I've heard of some attacks where an attacker can trick a user on an internal NAT-ted network to forward some packets to a router, but that's another story. If you're worried you can disable upnp completely, if you don't need it and wait for a firmware update.
Yes, but that would, technically, not be a vulnerability in the UPNP implementation. All the boxes attached to this router are managed by me and I can (and do) update them. It's the Netgear router that is making me worried.

Furthermore, my router is EOL'ed. I do not know what that exactly implies with respect to security bugfixes. But I have the nagging feeling that this is about 'it'... .
 
Old 01-30-2013, 07:17 AM   #4
displace
Member
 
Registered: Jan 2013
Location: EU
Distribution: Debian
Posts: 268

Rep: Reputation: 25
Can you replace the router firmware with OpenWRT?
 
Old 01-30-2013, 07:52 AM   #5
alpha645
LQ Newbie
 
Registered: Jul 2006
Posts: 25

Original Poster
Rep: Reputation: 0
I confirmed that the board (BCM6358) is supported (it's not SMP).

Through the old docs I came here: http://wiki.openwrt.org/doc/hardware...oadcom.bcm63xx

It says that there is no ADSL support at all. Only proprietary. It mentions that Netgear released some closed code, but that probably won't work on 2.6.39. The kernel the router is running is 2.6.8.1 if I'm not mistaken.

Further digging lead me to this place: https://forum.openwrt.org/viewtopic.php?id=20408 : Ergo, no DSL drivers. Bummer!

Too bad...

Last edited by alpha645; 01-30-2013 at 08:01 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Is there a Linux utility to configure UPnP in a router? ahwm Linux - Software 3 02-17-2010 01:51 PM
upnp and DHCP - DHPC connections don't renew their upnp settings (upnpd / dnsmasq) joke_dst Linux - Networking 0 05-20-2009 04:44 AM
SUSE 10.0 - Enabling UPnP for Router trenyboy Linux - Networking 1 01-17-2006 06:56 AM
UPnP on Linksys Router brokenflea Linux - Security 2 08-22-2004 01:54 AM
UPnP vulnerability in XP anoop_chandran General 13 01-08-2002 12:01 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:52 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration