COMMAND
Microcom
SYSTEMS AFFECTED
Compaq/Microcom 6000 integrators
PROBLEM
Alec Kosky found following. There is a DoS as well as a
brute-force password attack on these systems (4.0.13 for MNC and
PRI card). The denial of service problem is this: there is no
timeout when typing in the username and password - from what I
have seen, a user can make a telnet connection to the MNC or PRI
card and leave the connection open indefinitely. If the user only
has one connection open, then this is not problem. However, the
system will not accept more than 4 telnet connections at one time.
Thus, a malicious user/hacker could open 4 telnet connections
to either (or both cards) and deny all legitimate connections to
the card.
The other problem is that the system does not close the connection
after a specified number of invalid login attempts. A program
such as 'crack' could be modified to work over a network and
attempt to guess the administrator's password.
Assuming that since the 6000 Acess Integrator is their flagship
model, these problems are present in all Acess Integrator models.
SOLUTION
Microcom support advise people to turn off telnet access. That's
it - there was a message in their call reference that there is no
plans to upgrade or modify the pShell (pSOS).