Packeteer PacketWise CLI overflow DoS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Product: Packeteer PacketShaper
Model: 9500/ISP
Software: PacketWise 8.x (possibly others)

===========
Background
===========

Packeteer creates bandwidth management solutions such as the PacketShaper which "is the ultimate scalable platform for optimized WAN application performance?the only all-in-one solution for extending monitoring, shaping, acceleration and compression as well as centralized reporting and management across the distributed enterprise."

===========
Description
===========

The Packeteer PacketShaper appears to be vulnerable to a buffer overflow which can be triggered by a valid command followed by a long argument (around 1500 bytes).

# class show /Inbound/AAAAA...

There appear to be other places where such behavior can be seen, e.g. via the web interface:

https://xx.xx.xx.xx/clastree.htm?POLICY=/Inbound/Filesharing/BitTorrent/AAAAA...

Both of these examples require either "look" or "touch" access to the device.

===========
Impact
===========

The watchdog timer will trigger a unit reset/reboot, which takes around 30 seconds.  If there is no bypass mechanism in place (e.g. fiber bypass switch), service will be interrupted.



Packeteer has not responded to the initial reports.

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux