First published: Tue Jul 24 2018(Updated: )
Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the 'password' field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera's Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC-HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dahuasecurity Ip Camera Firmware | <dh_ipc-ack-themis_eng_p_v2.400.0000.14.r.20170713.bin | |
Dahuasecurity Ip Camera | ||
Dahuasecurity Ip Camera Firmware | <2.400.0000.14.r.20170713 |
Dahua has released firmware version DH_IPC-ACK-Themis_Eng_P_V2.400.0000.14.R.20170713.bin to address this issue
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3223 is a vulnerability found in Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 that may be vulnerable to a stack buffer overflow.
CVE-2017-3223 is classified as critical with a severity value of 9.8.
Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 are affected by CVE-2017-3223.
To fix CVE-2017-3223, you should update the firmware of your Dahua IP camera products to at least V2.400.0000.14.R.20170713.
No, only Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 are vulnerable to CVE-2017-3223.