HTTP: Dlink D-Link DIR-605L Improper Variable Parsing Buffer Overflow1

This signature detects attempts to exploit a known vulnerability in D-Link DIR-605L Wireless N300 Cloud Router. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted service.

Extended Description

The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.

Affected Products

Apache http_server

Short Name
HTTP:DLINK-DIR605L-CAPTCHA-BOF1
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2011-3192 D-Link DIR-605L Dlink Improper Overflow1 Parsing Variable bid:49303
Release Date
09/30/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Opensuse

Apache

Suse

Canonical

CVSS Score

7.8

Found a potential security threat?