exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

linksysDoS.txt

linksysDoS.txt
Posted Oct 16, 2003
Site DigitalPranksters.com

The Linksys EtherFast Cable/DSL Firewall Router BEFSX41 (Firmware 1.44.3) is susceptible to a denial of service attack when a long string is sent to the Log_Page_Num parameter of the Group.cgi script.

tags | exploit, denial of service, cgi
SHA-256 | f1c0300dc00e219b8dbc03dbdfde2f6bb99cf9e08b84db923315190b4e59337b

linksysDoS.txt

Change Mirror Download
DigitalPranksters Security Advisory
http://www.DigitalPranksters.com

LinkSys EtherFast Router Denial of Service Attack

Risk: Low

Product: Linksys EtherFast Cable/DSL Firewall Router BEFSX41 (Firmware
1.44.3)

Product URL: http://www.linksys.com/products/product.asp?prid=433

Vendor Contacted: September 9, 2003

Vendor Released Patch: September 26, 2003

DigitalPranksters Public Advisory Released: October 7, 2003

Found By: KrazySnake - krazysnake@digitalpranksters.com

Problem:
The Linksys BEFSX41 has web-based administration utility at a predictable
default address (http://192.168.1.1). The administration is done through a
series of html forms using the "get" method. The router also has an out of
the box password of "admin".

Under the default configuration the router is only accessible from the
local lan and not the internet. However, an attacker could set up a web
page or send html email to someone inside of the lan to indirectly send
commands to the router.

An attacker could specify a URL that results in denial of service. The
denial of service occurs when long string is sent to the System Log
Viewer's "Log_Page_Num" parameter. The router will be unresponsive after
the URL is visited when logging is enabled.

Proof of Concept:
If an attacker can get the admin of the router to view a URL like
http://192.168.1.1/Group.cgi?Log_Page_Num=1111111111&LogClear=0, the
router will become inoperable. The link could be set as the source of an
image html tag.

Resolution:
Linksys released an updated firmware to address this issue. This firmware
update is made available by Linksys from
http://www.linksys.com/download/firmware.asp?fwid=172.

Greetings:
SkippyInside, AngryB, Harmo, HTMLBCat, and Spyder.
Thanks to Linksys for fixing this issue.

Disclaimer:
Standard disclaimer applies. The opinions expressed in this advisory are
our own and not of any company. The information within this advisory may
change without notice. Use of this information constitutes acceptance for
use in an AS IS condition. There are no warranties with regard to this
information. In no event shall the author be liable for any damages
whatsoever arising out of or in connection with the use or spread of this
information. Any use of this information is at the user's own risk.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close