English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Siemens OZW / OZS Multiple Products libupnp Buffer Overflow Vulnerabilities


Secunia ID

SA52035

CVE-ID

CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, CVE-2012-5965

Release Date

31 Jan 2013

Criticality

Less Critical

Solution Status

Unpatched

Where

From local network

Impact
System access

This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Description

Multiple vulnerabilities have been reported in multiple Siemens OZW and OZS products, which can be exploited by malicious people to compromise a vulnerable device.

1) Multiple vulnerabilities are caused due to a bundled version of libupnp.

For more information:
SA51949

2) Multiple boundary errors within the "unique_service_name()" function (ssdp/ssdp_ctrlpt.c) in libupnp when handling SSDP requests can be exploited to cause stack-based buffer overflows.

The vulnerabilities are reported in the following products and versions:
* OZW772.01, OZW772.04, OZW772.16, OZW772.64, and OZW772.250 running firmware versions V4.06 and prior
* OZW672.01, OZW672.04, and OZW672.16 running firmware versions V4.06 and prior
* OZW775 running firmware versions V3.01 and prior
* OZS164.13 and OZS164.23 running firmware versions V2.00 and prior

Solution

No official solution is currently available. The vendor is planning to provide fixes with upcoming firmware updates.

Reported by

2) Rapid7

Original Advisory

Siemens SSA-963338:
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-963338.pdf

Rapid7:
https://community.rapid7.com/docs/DOC-2150
https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play