[6503] in bugtraq

home help back first fref pref prev next nref lref last post

Re: APC UPS PowerChute PLUS exploit...

daemon@ATHENA.MIT.EDU (Pascal Gienger)
Mon Apr 13 14:32:02 1998

Date: 	Mon, 13 Apr 1998 10:47:28 +0200
Reply-To: Pascal Gienger <p@ZNET.DE>
From: Pascal Gienger <p@ZNET.DE>
X-To:         Theo Schlossnagle <jesus@BLAZE.CS.JHU.EDU>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.GSO.3.96.980410230211.26535A-100000@peregrine.cs.jhu.edu>;
              from Theo Schlossnagle on Fri, Apr 10, 1998 at 11:13:02PM -0400

> The PowerChute PLUS software distributed with the UPSs provides a TCP/IP
> (UDP/IP) way to communicate with (for monitoring) UPS on the local subnet.
> It listens on port 6549 and listens for broadcast requests (UDP).
> So if you make as if you are actually requesting information, but send it
> the wrong packet... Well end of ./_upsd (the name of the daemon).

This is a known problem. I experienced that behaviour already one year
ago when I installed our PowerChutes here.

I recommend using the freely availavle upsd without TCP/IP control. It
works well well with the PowerChute Series.

> I spoke with APC (www.apcc.com) and they blew me off.  Forwarded the issue
> to their techinical crew, but I never heard word again.

They are interested in their Windows NT stuff and that is all. :(

Pascal
--
p@znet.de                  Factum Data            - A woman without a man
http://pascal.znet.de/     Pascal Gienger         - is like a fish without
5734900@skyper.de (Subj!)  Inselg. 13, 78462 KN   - a bicycle...
        http://echo.znet.de:8888/ echo \8888:ed.tenz.ohce\\:ptth

home help back first fref pref prev next nref lref last post