In association with heise online

06 May 2013, 20:37

D-Link update closes voyeur's ASCII peephole

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

D-Link ASCII stream picture
Zoom Can you tell what it is yet? Core Security snapped this picture of their coffee pot via the streaming hole.
Source: Core Security
Network equipment supplier D-Link has released firmware security updates for five routers and eight IP cameras. Whilst the router vulnerabilities are strongly reminiscent of vulnerabilities previously fixed in other models, the camera vulnerabilities conceal a nasty surprise – unauthorised viewers can intercept the camera stream as either a video stream or ASCII output.

The IP camera vulnerabilities were discovered by Core Security. According to Core Security's advisory, there are several different methods whereby an unauthenticated attacker can access the camera stream as either an HTTP or RTSP stream or even as an ASCII animation. The latter is the result of the camera's willingness to output the image luminance via the lums.cgi script. It is also possible to inject commands via the camera's web interface and there's also the presence of hard-coded access credentials in the firmware effectively creating a backdoor.

Core Security reports that it informed D-Link of the security issues in mid-March. According to D-Link, the newly released update addresses all of the vulnerabilities listed in the advisory in all models sold or previously sold in the UK. Specifically, the following models:

  • DCS-1130
  • DCS-2121
  • DCS-2121 (FR)
  • DCS-2121 (Tesco)
  • DCS-3411
  • DCS-3430
  • DCS-5605
  • DCS-7510

There are also firmware security updates for the following routers:

  • DIR-815 (hardware revision A)
  • DIR-845L (hardware revision A)
  • DIR-865L (hardware revision A)
  • DSL-320B (hardware revision D2)
  • DSL-321B (hardware revision D2)

(djwm)

Print Version | Send by email | Permalink: http://h-online.com/-1857578
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit