What's new
  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Shockingly Simple Flaw Leaves 'Millions Of Home Routers Open To Attack'


Another day, another router flaw.

I say we nuke the entire site from orbit. Only way to be sure.

(By which I mean, time to rewrite those home gateway firmwares from the ground up, ditching all that 10 years-ish code most of them still use, which was written back when the idea of a buffer overflow was unheard of).
 
(By which I mean, time to rewrite those home gateway firmwares from the ground up, ditching all that 10 years-ish code most of them still use, which was written back when the idea of a buffer overflow was unheard of).

Agreed - many of the challenges compound themselves by having common board support packages, so it might not even be the vendor's fault, but upstream...
 
Most home users are not educated on the role of a gateway router. Most home users should not be exposing anything to the Internet and if they need remote access they should know how to run a VPN. USB ports and DMZ options on ISP home routers is just a bad idea. Best is to run a UTM behind the gateway device to protect everything inside your LAN.
 
Buffer overflows are easy to introduce, and hard to find...

case in point - the first one can be bad, the second one is better, mainly due to strncpy having a built-in check...

int function(char * data){
char overflow[255];
strcpy (overflow, data);
}

vs

int function(char * data){

char overflow[255];

strncpy (overflow, data, 255);

}

We have to assume that the OEM's, along with the SoC vendors, are not malicious - most coders don't deliberately introduce bugs, but things creep thru - esp. late at night, during crunch time, and looking at code that has already been written - it's mentally taxing work...
 
int function(char * data){
char overflow[255];
strcpy (overflow, data);
}

vs

int function(char * data){
char overflow[255];
strncpy (overflow, data, 255);

}


Then it becomes a bug-hunt - where's Waldo? -

found.jpg


When looking thru millions of lines of code, these things are there...
 

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Back
Top