CWE
119
Advisory Published
Updated

CVE-2017-8410: Buffer Overflow

First published: Tue Jul 02 2019(Updated: )

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary performs a memcpy operation at address 0x00011E34 with the value sent in the "Authorization: Basic" RTSP header and stores it on the stack. The number of bytes to be copied are calculated based on the length of the string sent in the RTSP header by the client. As a result, memcpy copies more data then it can hold on stack and this results in corrupting the registers for the caller function sub_F6CC which results in memory corruption. The severity of this attack is enlarged by the fact that the same value is then copied on the stack in the function 0x00011378 and this allows to overflow the buffer allocated and thus control the PC register which will result in arbitrary code execution on the device.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Dlink Dcs-1100 Firmware
Dlink Dcs-1100
Dlink Dcs-1130 Firmware
Dlink Dcs-1130

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2017-8410?

    CVE-2017-8410 is an issue discovered on D-Link DCS-1100 and DCS-1130 devices that allows command injection and stack overflow via a crafted RTSP header.

  • What is the severity of CVE-2017-8410?

    The severity of CVE-2017-8410 is critical with a CVSS score of 9.8.

  • Which devices are affected by CVE-2017-8410?

    D-Link DCS-1100 and DCS-1130 devices are affected by CVE-2017-8410.

  • How does CVE-2017-8410 work?

    CVE-2017-8410 works by exploiting the rtspd binary in the /sbin folder of the affected devices, which mishandles RTSP connections and allows command injection and stack overflow through a malformed RTSP header.

  • How can I fix CVE-2017-8410?

    To fix CVE-2017-8410, it is recommended to apply the latest firmware updates provided by D-Link for the DCS-1100 and DCS-1130 devices.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203