[6515] in bugtraq

home help back first fref pref prev next nref lref last post

Re: APC UPS PowerChute PLUS exploit...

daemon@ATHENA.MIT.EDU (Rick Perry)
Tue Apr 14 12:42:11 1998

Date: 	Mon, 13 Apr 1998 12:11:39 -0400
Reply-To: Rick Perry <perry@NEWS.VILL.EDU>
From: Rick Perry <perry@NEWS.VILL.EDU>
To: BUGTRAQ@NETSPACE.ORG

Theo Schlossnagle <jesus@blaze.cs.jhu.edu> writes:
>The PowerChute PLUS software distributed with the UPSs provides a TCP/IP
>(UDP/IP) way to communicate with (for monitoring) UPS on the local subnet.
>It listens on port 6549 and listens for broadcast requests (UDP).
>So if you make as if you are actually requesting information, but send it
>the wrong packet... Well end of ./_upsd (the name of the daemon).

I believe that the powerchute software will not listen on the net if you
have the following in powerchute.ini

[ Network ]
 UseTCP = NO

I didn't yet try your exploit, but with UseTCP set to NO this machine doesn't
show up in the list of remote ups's when using the powerchute admin interface
from another machine on the same subnet.

...Rick         perry@ece.vill.edu, http://www.ece.vill.edu/~perry  [PGP]

home help back first fref pref prev next nref lref last post