![]() ![]() To our surprise, the first page of Shodan lists hosts running libupnp 1.3.1. ASLR and NX generally won’t be an issue for exploitation.They will stay connected to the Internet until they die or are replaced with a new device that has the same libpunp implementation.These are almost exclusively embedded systems (routers, TVs, IoT oh my, etc.) Which means a few things: Punching “Portable SDK for UPnP Devices” into Shodan yields approximately 4.8 million hosts. CONFIGURE ASSET UPNP FOR VIDEO FOLDER PORTABLEPortable SDK for UPnP Devices (aka libpunp) is one of the oldest universal plug-and-play stacks around and can use glibc. Some individuals on Reddit tracked the advisories for a brief while but only scratched the surface of products and vendors impacted. By and large, companies are simply pushing out patches for glibc as that is typically quicker than doing analysis to determine if an application is vulnerable. ![]() Surprisingly, there have been very few (if any?) advisories discussing specific attacks on applications that use this common glibc function. ![]() The getaddrinfo() function helps programs resolve hostnames into IP addresses and therefore can be found in an incredible amount of software. Google released a proof of concept via Fermin Serna’s github account. This issue also appeared in glibc’s bug tracker back in July 2015. On FebruGoogle disclosed a stack overflow in glibc triggered via interaction between the getaddrinfo() function and specifically formed DNS responses designated CVE-2015-7547. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |