PT-2011-30: Disclosure of sensitive information in D-Link DIR-300 Router

(PT-2011-30) Positive Technologies Security Advisory
Disclosure of sensitive information in D-Link DIR-300 Router

Vulnerable software

Router management system for D-Link DIR-300

Severity level

Severity level: Medium
Impact: Sensitive information disclosure
Access Vector: Remote

CVSS v2:
Base Score: 6.8
Vector: (AV:N/AC:L/Au:S/C:C/I:N/A:N)

CVE: CVE-2011-4723

Software description

A router management system for D-Link DIR-300.

Vulnerability description

Positive Research Center has discovered that password hashing is not implemented in D-Link DIR-300 routers, which allows one to obtain passwords in plain text.

How to fix

Update your software up to the latest version
Update link

Advisory status

09.09.2011 - Vendor is notified
09.09.2011 - Vendor gets vulnerability details
19.09.2011 - Vendor releases fixed version and details
20.10.2011 - Public disclosure

Credits

The vulnerability was detected by Sergey Scherbel, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2011-30

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/advisory1.aspx
http://en.securitylab.ru/lab/

About Positive Technologies

Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks.  Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit www.ptsecurity.com

*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+

Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability

A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software an...

30 september, 2013

Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability

A vulnerability in the Internet Key Exchange (IKE) protocol of Cisco IOS Software and Cisco ...

30 september, 2013

Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability

A vulnerability in the implementation of the Network Time Protocol (NTP) feature in Cisco IO...

30 september, 2013

MS14-020: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (2950145)

This security update resolves a privately reported vulnerability in Microsoft Office.

08 april, 2014

MS14-019: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229)

This security update resolves a publicly disclosed vulnerability in Microsoft Windows.

08 april, 2014

MS14-018: Cumulative Security Update for Internet Explorer (2950467)

This security update resolves six privately reported vulnerabilities in Internet Explorer.

08 april, 2014

This Alert covers CVE-2010-0896 for the mail component of the Sun Convergence product

This Sun Alert covers CVE-2010-0896 for the mail component of the Sun Convergence product.

14 april, 2010

This Alert Covers CVE-2010-0893 for the Mail Component of the Sun Convergence Product

This Alert covers CVE-2010-0893 for the mail component of the Sun Convergence product.

14 april, 2010

SunOS 5.10_x86: ucode driver patch

6905530 processor microcode code can panic when retrieving microcode revision.

02 february, 2010