maiopulse.blogg.se

Solarwinds dameware vulnerability
Solarwinds dameware vulnerability








Le32 SrvSharedSecretLen // length of server-computed DH/ECDH shared secret Le32 CltSharedSecretByteSum // client-computed sum of all bytes in the secret Le32 CltSharedSecretLen // length of client-computed DH/ECDH shared secret The key exchange msg has the following format: text:100026EC lea eax, stack buffer received msg text:100026E4 mov edi, attacker-controlled Inside the key exchange message, an unauthenticated, remote attacker can specify a large 'SigPubkeyLen' field (i.e., 0x1fffff) to cause a buffer over-read/over-write condition in DWRCRSA.dll:

solarwinds dameware vulnerability solarwinds dameware vulnerability

During the key exchange, the client signs the ECDH shared secret with an EC private key and sends the server both the signature and the EC public key so that the server can verify the signature.

solarwinds dameware vulnerability

When the DWRCS.exe 'Allow only FIPS Mode' setting is enabled, DWRCRSA.dll is loaded to perform ECDH key exchange.










Solarwinds dameware vulnerability