ExTS Admin Starbuck Posted June 21, 2016 ExTS Admin Posted June 21, 2016 Apple fixes memory issue that led to RCE in AirPort routers http://img.photobucket.com/albums/v708/starbuck50/apple-fixes-high-risk-security-flaw-in-airport-routers-505489-2_zpstxiajknj.jpg Yesterday, Apple released new firmware versions for its AirPort router models, which fixed a remote code execution (RCE) flaw tracked as CVE-2015-7029 and reported to the company last year by security researcher Alexandre Helie. Apple says that "a remote attacker may be able to cause arbitrary code execution" and take over the device, based on the complexity of their attack code. CVE-2015-7029 is a memory corruption issue, which Apple says exists in the way the router p****s DNS requests. Apple didn't mention if the problem is affecting inbound or outbound DNS traffic. Regardless, both exploitation scenarios are trivial since DNS requests are involved in almost every Internet connection set up today. The attack surface is huge, and an attacker would not have to wait long for a successful compromise. Sophos security researcher Paul Ducklin says he believes the problem manifests when "feeding malformed replies to an AirPort that makes outbound DNS requests on behalf of the devices on its internal network," because "most routers are set up to work this way." If true, compromising an AirPort device would be a trivial affair. Apple said it fixed the memory corruption issue by adding better memory bounds checking to prevent code from executing in the wrong parts of the router's memory. CVE-2015-7029 was fixed in the AirPort base station firmware version 7.7.7. The firmware is available for download via Apple's website. Source: http://news.softpedia.com/news/apple-fixes-high-risk-security-flaw-in-airport-routers-505489.shtml Quote Member of:UNITE
amironcarro Posted August 25, 2016 Posted August 25, 2016 Apple fixes memory issue that led to RCE in AirPort routers http://img.photobucket.com/albums/v708/starbuck50/apple-fixes-high-risk-security-flaw-in-airport-routers-505489-2_zpstxiajknj.jpg Yesterday, Apple released new firmware versions for its AirPort router models, which fixed a remote code execution (RCE) flaw tracked as CVE-2015-7029 and reported to the company last year by security researcher Alexandre Helie. Apple says that "a remote attacker may be able to cause arbitrary code execution" and take over the device, based on the complexity of their attack code. CVE-2015-7029 is a memory corruption issue, which Apple says exists in the way the router p****s DNS requests. Apple didn't mention if the problem is affecting inbound or outbound DNS traffic. Regardless, both exploitation scenarios are trivial since DNS requests are involved in almost every Internet connection set up today. The attack surface is huge, and an attacker would not have to wait long for a successful compromise. Sophos security researcher Paul Ducklin says he believes the problem manifests when "feeding malformed replies to an AirPort that makes outbound DNS requests on behalf of the devices on its internal network," because "most routers are set up to work this way." If true, compromising an AirPort device would be a trivial affair. Apple said it fixed the memory corruption issue by adding better memory bounds checking to prevent code from executing in the wrong parts of the router's memory. CVE-2015-7029 was fixed in the AirPort base station firmware version 7.7.7. The firmware is available for download via Apple's website. Source: http://news.softpedia.com/news/apple-fixes-high-risk-security-flaw-in-airport-routers-505489.shtml Good news i must say, i was using PureVPN android app for this purpose because it offers great support for a diverse range of VPN routers including DDWRT, Tomato, Asus, Belkin, TP-Link, etc. Now apple fixed this thing its a great news i must say. Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.