Jump to content
Nytro

Mikrotik RouterOS sshd (ROSSSH) - Remote Preauth Heap Corruption

Recommended Posts

Posted

[h=1]Mikrotik RouterOS sshd (ROSSSH) - Remote Preauth Heap Corruption[/h]

During an audit the Mikrotik RouterOS sshd (ROSSSH) has been identified to have a remote previous to authentication heap corruption in its sshd component.

Exploitation of this vulnerability will allow full access to the router device.

This analysis describes the bug and includes a way to get developer access to recent versions of Mikrotik RouterOS

using the /etc/devel-login file. This is done by forging a modified NPK file using a correct signature and logging

into the device with username ‘devel’ and the password of the administrator. This will drop into a busybox shell for

further researching the sshd vulnerability using gdb and strace tools that have been compiled for the Mikrotik busybox

platform.

Shodanhq.com shows >290.000 entries for the ROSSSH search term.

The 50 megs Mikrotik package including the all research items can be downloaded here:

http://www.farlight.org/mikropackage.zip
http://www.exploit-db.com/sploits/28056.zip

Sursa: Mikrotik RouterOS sshd (ROSSSH) - Remote Preauth Heap Corruption

Ok, acum am inteles. Zilele trecute am primit DDOS (cica) de pe 550+ IP-uri. ( Info )

Asa cum Shocker a sugerat, acele IP-uri erau routere Microtik. Am o vaga impresie ca aceasta este metoda prin care cine nu ne place a obtinut acces la acele routere.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...