VAR-200810-0530

Vulnerability from variot - Updated: 2022-05-17 01:49

Telecom Italia is Italy's most important ISP, offering ADSL services called Alice. If the intranet user sends the following IP packet to the Alice router: 1) IP protocol number 2552) 8 bytes load size 3) The load is the first 8 bytes of the MD5 data after the br0 device MAC address is deformed 4) These modems The br0 has the same eth0 mac to activate the router's management interface and telnet/ftp/tftp service for unauthorized access. Multiple Telecom Italia routers are prone to an authentication bypass vulnerability that may allow attackers to gain access to a router's administration interface and unauthorized access to certain services. Successfully exploiting this issue will allow attackers to gain unauthorized administrative access to the affected device and activate services such as telnet, ftp, and tftp. The following routers are affected. AGA (Alice Gate2 plus Wi-Fi]) AGB (Alice Gate2 plus) AG2P-AG3 (AG2P-AG3[Alice Gate W2+) AGPV-AGPF (Alice Gate VoIP 2 Plus Wi-Fi). ----------------------------------------------------------------------

Do you need accurate and reliable IDS / IPS / AV detection rules?

Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/


TITLE: Telecom Italia Alice Routers Magic Packet Security Bypass

SECUNIA ADVISORY ID: SA32258

VERIFY ADVISORY: http://secunia.com/advisories/32258/

CRITICAL: Less critical

IMPACT: Security Bypass

WHERE:

From local network

OPERATING SYSTEM: Alice Gate2 Plus Wi-Fi http://secunia.com/advisories/product/17350/ Alice Gate VoIP 2 Plus Wi-Fi http://secunia.com/advisories/product/20162/ Alice Gate 2 Plus http://secunia.com/advisories/product/20160/ Alice Gate W2+ http://secunia.com/advisories/product/20161/

DESCRIPTION: saxdax and drpepperONE have reported a vulnerability in various Telecom Italia Alice routers, which can be exploited by malicious people to bypass certain security restrictions.

SOLUTION: Restrict network access to the vulnerable device.

PROVIDED AND/OR DISCOVERED BY: saxdax and drpepperONE

ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2008-October/065050.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "italia group messenger",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "telecom",
        "version": "0"
      },
      {
        "_id": null,
        "model": "italia agpv-agpf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "telecom",
        "version": "0"
      },
      {
        "_id": null,
        "model": "italia agb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "telecom",
        "version": "0"
      },
      {
        "_id": null,
        "model": "italia aga",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "telecom",
        "version": "0"
      },
      {
        "_id": null,
        "model": "italia ag2p-ag3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "telecom",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976"
      },
      {
        "db": "BID",
        "id": "31754"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "saxdax \u0026 drpepperONE.",
    "sources": [
      {
        "db": "BID",
        "id": "31754"
      }
    ],
    "trust": 0.3
  },
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2008-4976",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "CNVD",
            "id": "CNVD-2008-4976",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Telecom Italia is Italy\u0027s most important ISP, offering ADSL services called Alice. If the intranet user sends the following IP packet to the Alice router: 1) IP protocol number 2552) 8 bytes load size 3) The load is the first 8 bytes of the MD5 data after the br0 device MAC address is deformed 4) These modems The br0 has the same eth0 mac to activate the router\u0027s management interface and telnet/ftp/tftp service for unauthorized access. Multiple Telecom Italia routers are prone to an authentication bypass vulnerability that may allow attackers to gain access to a router\u0027s administration interface and unauthorized access to certain services. \nSuccessfully exploiting this issue will allow attackers to gain unauthorized administrative access to the affected device and activate services such as telnet, ftp, and tftp. \nThe following routers are affected. \nAGA (Alice Gate2 plus Wi-Fi])\nAGB (Alice Gate2 plus)\nAG2P-AG3 (AG2P-AG3[Alice Gate W2+)\nAGPV-AGPF (Alice Gate VoIP 2 Plus Wi-Fi). ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nTelecom Italia Alice Routers Magic Packet Security Bypass\n\nSECUNIA ADVISORY ID:\nSA32258\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32258/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nAlice Gate2 Plus Wi-Fi\nhttp://secunia.com/advisories/product/17350/\nAlice Gate VoIP 2 Plus Wi-Fi\nhttp://secunia.com/advisories/product/20162/\nAlice Gate 2 Plus\nhttp://secunia.com/advisories/product/20160/\nAlice Gate W2+\nhttp://secunia.com/advisories/product/20161/\n\nDESCRIPTION:\nsaxdax and drpepperONE have reported a vulnerability in various\nTelecom Italia Alice routers, which can be exploited by malicious\npeople to bypass certain security restrictions. \n\nSOLUTION:\nRestrict network access to the vulnerable device. \n\nPROVIDED AND/OR DISCOVERED BY:\nsaxdax and drpepperONE\n\nORIGINAL ADVISORY:\nhttp://lists.grok.org.uk/pipermail/full-disclosure/2008-October/065050.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976"
      },
      {
        "db": "BID",
        "id": "31754"
      },
      {
        "db": "PACKETSTORM",
        "id": "70988"
      }
    ],
    "trust": 0.9
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "BID",
        "id": "31754",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "32258",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "70988",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976"
      },
      {
        "db": "BID",
        "id": "31754"
      },
      {
        "db": "PACKETSTORM",
        "id": "70988"
      }
    ]
  },
  "id": "VAR-200810-0530",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976"
      }
    ]
  },
  "last_update_date": "2022-05-17T01:49:21.191000Z",
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 0.7,
        "url": "http://secunia.com/advisories/32258/"
      },
      {
        "trust": 0.3,
        "url": "http://www.telecomitalia.com/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/497312"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/20162/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/binary_analysis/sample_analysis/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/20161/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/17350/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/20160/"
      },
      {
        "trust": 0.1,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-october/065050.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976"
      },
      {
        "db": "BID",
        "id": "31754"
      },
      {
        "db": "PACKETSTORM",
        "id": "70988"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976",
        "ident": null
      },
      {
        "db": "BID",
        "id": "31754",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "70988",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2008-10-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2008-4976",
        "ident": null
      },
      {
        "date": "2008-10-14T00:00:00",
        "db": "BID",
        "id": "31754",
        "ident": null
      },
      {
        "date": "2008-10-16T22:55:58",
        "db": "PACKETSTORM",
        "id": "70988",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2008-10-14T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2008-4976",
        "ident": null
      },
      {
        "date": "2008-10-16T20:57:00",
        "db": "BID",
        "id": "31754",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "31754"
      }
    ],
    "trust": 0.3
  },
  "title": {
    "_id": null,
    "data": "Telecom Italia Alice Router IP Packet Unauthorized Access Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2008-4976"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "_id": null,
    "data": "Access Validation Error",
    "sources": [
      {
        "db": "BID",
        "id": "31754"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…