Page MenuHomeVyOS Platform

vyos router 1.2.7 snmp Dos bug
Open, HighPublicBUG

Description

We have replayed the vulnerability in the vyos 1.2.7 device versions. And We perform debugging analysis on this vulnerability version. Please check.

There are three vulnerability, and it is caused by a Use-After-Free and an insufficient check of null pointer.

And then I may need you to provide an email and I will provide POC and a detailed vulnerability report. Here is my email: zoenan7@gmail.com

Details

Difficulty level
Easy (less than an hour)
Version
version 1.2.7
Why the issue appeared?
Will be filled on close
Is it a breaking change?
Unspecified (possibly destroys the router)
Issue type
Security vulnerability

Event Timeline

May I ask where I can submit poC? Do you provide an email address or upload files here?

@zoenan7 Thanks for your research! You can send the PoC to daniil@vyos.io

Also, we use stock, unmodified SNMPd, so the same problem likely exists (or had existed) in the upstream code and we may need to report it to the net-snmp maintainers. Could you check if later versions, e.g. the one used in VyOS 1.3 release candidates or 1.4 rolling release is also vulnerable?

Hello, I have found three vulnerabilities in V1.2.7, one of which can also be reproduced in V1.3, please continue to check the other versions, I will send all three POCs to your email, thank you for your work.

By the way, The password of the compressed package is HGkasjgJFYL261.

I have sent the POC of the vulnerability to daniil@vyos.io.

I have a question. If you confirm the existence of the vulnerability, can you report to the NET-SNMP vendor and apply for a CVE number?

By the way, the SNMPD service of the router will not restart automatically. After the SNMP service is attacked, the SNMP service cannot be restored even if the device is restarted, which may be an inappropriate implementation.

@dmbaturin Did you get my email? If not, please let me know and I will send it again